Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
27i42a6Qag.exe

Overview

General Information

Sample name:27i42a6Qag.exe
renamed because original name is a hash value
Original sample name:9527adb6094eab92b0a8c22e2bffe713.exe
Analysis ID:1365579
MD5:9527adb6094eab92b0a8c22e2bffe713
SHA1:93ca6d0fea8a6583f947515b47360e31894326b5
SHA256:08bf93d859767b6623b49312cdc8076b701d2147ce3d87e3a994734f0f1319a3
Tags:exeLummaStealer
Infos:

Detection

Glupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
UAC bypass detected (Fodhelper)
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected Petite Virus
Yara detected RedLine Stealer
Yara detected SmokeLoader
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Drops PE files with benign system names
Found Tor onion address
Found evasive API chain (may stop execution after checking computer name)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Maps a DLL or memory area into another process
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 27i42a6Qag.exe (PID: 6396 cmdline: C:\Users\user\Desktop\27i42a6Qag.exe MD5: 9527ADB6094EAB92B0A8C22E2BFFE713)
    • explorer.exe (PID: 4056 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • CAC0.exe (PID: 5740 cmdline: C:\Users\user~1\AppData\Local\Temp\CAC0.exe MD5: EE1049D8F8248D11080582FE27F96843)
        • CAC0.exe (PID: 2608 cmdline: C:\Users\user~1\AppData\Local\Temp\CAC0.exe MD5: EE1049D8F8248D11080582FE27F96843)
      • D89C.exe (PID: 1920 cmdline: C:\Users\user~1\AppData\Local\Temp\D89C.exe MD5: 033576B4B54E5CB69EC8491FF6624C9F)
        • D89C.exe (PID: 5332 cmdline: C:\Users\user~1\AppData\Local\Temp\D89C.exe MD5: 033576B4B54E5CB69EC8491FF6624C9F)
      • E212.exe (PID: 6828 cmdline: C:\Users\user~1\AppData\Local\Temp\E212.exe MD5: 62C9E15DD99C7D3B7367DCF220579C54)
      • E753.exe (PID: 1252 cmdline: C:\Users\user~1\AppData\Local\Temp\E753.exe MD5: 08DEB048589E4E6D6F16AB66BD1020F8)
        • conhost.exe (PID: 1304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • F280.exe (PID: 3424 cmdline: C:\Users\user~1\AppData\Local\Temp\F280.exe MD5: 727A16734E04C21EE28B8981510BF802)
      • csrss.exe (PID: 6592 cmdline: "C:\ProgramData\Drivers\csrss.exe" MD5: EE1049D8F8248D11080582FE27F96843)
        • csrss.exe (PID: 2168 cmdline: "C:\ProgramData\Drivers\csrss.exe" MD5: EE1049D8F8248D11080582FE27F96843)
      • 2BD.exe (PID: 4240 cmdline: C:\Users\user~1\AppData\Local\Temp\2BD.exe MD5: 76008C3F4A84021E02E9AEEC9FB1C9D8)
        • cmd.exe (PID: 5188 cmdline: C:\Windows\Sysnative\cmd.exe /C fodhelper MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 4836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • fodhelper.exe (PID: 4296 cmdline: fodhelper MD5: 85018BE1FD913656BC9FF541F017EACD)
          • fodhelper.exe (PID: 4808 cmdline: "C:\Windows\system32\fodhelper.exe" MD5: 85018BE1FD913656BC9FF541F017EACD)
          • fodhelper.exe (PID: 2268 cmdline: "C:\Windows\system32\fodhelper.exe" MD5: 85018BE1FD913656BC9FF541F017EACD)
      • 153C.exe (PID: 3916 cmdline: C:\Users\user~1\AppData\Local\Temp\153C.exe MD5: A43D9BCAD3770524E73836B410837BFC)
        • 153C.tmp (PID: 2516 cmdline: "C:\Users\user~1\AppData\Local\Temp\is-SE9SP.tmp\153C.tmp" /SL5="$70050,7161388,54272,C:\Users\user~1\AppData\Local\Temp\153C.exe" MD5: DC768C91E97B42F218028EFA028C41CC)
          • 153C.exe (PID: 1108 cmdline: "C:\Users\user\AppData\Local\Temp\153C.exe" /SPAWNWND=$203E6 /NOTIFYWND=$70050 MD5: A43D9BCAD3770524E73836B410837BFC)
            • 153C.tmp (PID: 5736 cmdline: "C:\Users\user~1\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp" /SL5="$303F6,7161388,54272,C:\Users\user\AppData\Local\Temp\153C.exe" /SPAWNWND=$203E6 /NOTIFYWND=$70050 MD5: DC768C91E97B42F218028EFA028C41CC)
      • csrss.exe (PID: 4332 cmdline: "C:\ProgramData\Drivers\csrss.exe" MD5: EE1049D8F8248D11080582FE27F96843)
        • csrss.exe (PID: 2356 cmdline: "C:\ProgramData\Drivers\csrss.exe" MD5: EE1049D8F8248D11080582FE27F96843)
      • regsvr32.exe (PID: 5628 cmdline: regsvr32 /s C:\Users\user~1\AppData\Local\Temp\2635.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
        • regsvr32.exe (PID: 6948 cmdline: /s C:\Users\user~1\AppData\Local\Temp\2635.dll MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
      • explorer.exe (PID: 3032 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
      • explorer.exe (PID: 6912 cmdline: C:\Windows\explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • svchost.exe (PID: 6516 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 5916 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 564 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7088 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 4832 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 3592 cmdline: C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 4784 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 2404 cmdline: C:\Windows\system32\svchost.exe -k LocalService -s W32Time MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • atjdeae (PID: 3232 cmdline: C:\Users\user\AppData\Roaming\atjdeae MD5: 9527ADB6094EAB92B0A8C22E2BFFE713)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
GluptebaGlupteba is a trojan horse malware that is one of the top ten malware variants of 2021. After infecting a system, the Glupteba malware can be used to deliver additional malware, steal user authentication information, and enroll the infected system in a cryptomining botnet.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.glupteba
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"C2 url": ["dayfarrichjwclik.fun", "neighborhoodfeelsa.fun", "ratefacilityframw.fun", "reviveincapablewew.pw", "cakecoldsplurgrewe.pw", "opposesicknessopw.pw", "politefrightenpowoa.pw"], "Build id": "NmLpQW--spam2"}
{"Version": 2022, "C2 list": ["http://pirateking.online/tmp/index.php", "http://piratia.pw/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\RButtonTRAY\bin\x86\is-N4QUM.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
    C:\Program Files (x86)\RButtonTRAY\bin\x86\is-I133A.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
      C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E4V7I.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
        C:\Program Files (x86)\RButtonTRAY\bin\x86\is-41K4U.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S2I8K.tmpJoeSecurity_PetiteVirusYara detected Petite VirusJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
              00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
              • 0x274:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
              00000000.00000002.1282976357.0000000000AD9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
              • 0x701f:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
              0000000D.00000003.1464709517.00000000009E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                00000014.00000002.1709868553.0000000000B18000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
                • 0x766c:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
                Click to see the 28 entries
                SourceRuleDescriptionAuthorStrings
                0.3.27i42a6Qag.exe.24a0000.0.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                  0.2.27i42a6Qag.exe.ab0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                    13.2.atjdeae.9d0e67.1.raw.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                      20.2.F280.exe.400000.0.unpackJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
                        18.2.E753.exe.5e0000.1.unpackJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
                          Click to see the 11 entries
                          No Sigma rule has matched
                          No Snort rule has matched

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: 27i42a6Qag.exeAvira: detected
                          Source: http://ifdnzact.com/?dn=csiny.de&pid=9PO755G95Avira URL Cloud: Label: phishing
                          Source: 00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://pirateking.online/tmp/index.php", "http://piratia.pw/tmp/index.php"]}
                          Source: 18.2.E753.exe.5e0000.1.unpackMalware Configuration Extractor: LummaC {"C2 url": ["dayfarrichjwclik.fun", "neighborhoodfeelsa.fun", "ratefacilityframw.fun", "reviveincapablewew.pw", "cakecoldsplurgrewe.pw", "opposesicknessopw.pw", "politefrightenpowoa.pw"], "Build id": "NmLpQW--spam2"}
                          Source: 27i42a6Qag.exeReversingLabs: Detection: 32%
                          Source: 27i42a6Qag.exeVirustotal: Detection: 47%Perma Link
                          Source: Yara matchFile source: 24.2.2BD.exe.400000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.2.2BD.exe.2ea0e67.15.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.3.2BD.exe.3790000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000018.00000003.1710868011.0000000003BD2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3811903783.0000000000843000.00000040.00000001.01000000.0000001C.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3832224383.00000000032E3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: 27i42a6Qag.exeJoe Sandbox ML: detected
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: dayfarrichjwclik.fun
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: neighborhoodfeelsa.fun
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: ratefacilityframw.fun
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: reviveincapablewew.pw
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: cakecoldsplurgrewe.pw
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: opposesicknessopw.pw
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: politefrightenpowoa.pw
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
                          Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpString decryptor: NmLpQW--spam2
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062C700 _strlen,CryptStringToBinaryA,CryptStringToBinaryA,18_2_0062C700
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB22651E90 PyExc_OverflowError,PyErr_SetString,PyExc_TypeError,PyErr_SetString,PyLong_AsUnsignedLong,PyErr_Occurred,PyExc_TypeError,PyErr_SetString,PyLong_AsUnsignedLong,PyErr_Occurred,PyExc_TypeError,PyErr_SetString,PyLong_AsUnsignedLong,PyErr_Occurred,PyExc_TypeError,PyErr_SetString,EVP_PBE_scrypt,PyExc_ValueError,PyErr_SetString,PyBytes_FromStringAndSize,PyEval_SaveThread,EVP_PBE_scrypt,PyEval_RestoreThread,PyExc_ValueError,PyExc_ValueError,PyErr_Format,PyExc_ValueError,PyErr_Format,PyExc_ValueError,PyErr_SetString,22_2_00007FFB22651E90
                          Source: CAC0.exe, 0000000F.00000003.1854630869.000000000383B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -----BEGIN RSA PUBLIC KEY-----memstr_af888d6f-3

                          Privilege Escalation

                          barindex
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeRegistry value created: DelegateExecute
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeRegistry value created: NULL "C:\Users\user~1\AppData\Local\Temp\2BD.exe"

                          Bitcoin Miner

                          barindex
                          Source: Yara matchFile source: 24.2.2BD.exe.400000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.2.2BD.exe.2ea0e67.15.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.3.2BD.exe.3790000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000018.00000003.1710868011.0000000003BD2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3811903783.0000000000843000.00000040.00000001.01000000.0000001C.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3832224383.00000000032E3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                          Compliance

                          barindex
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeUnpacked PE file: 24.2.2BD.exe.400000.5.unpack
                          Source: 27i42a6Qag.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                          Source: Binary string: C:\rogajehanovo\vezaviku\xoyi.pdb source: 27i42a6Qag.exe, 00000000.00000002.1282558748.0000000000423000.00000002.00000001.01000000.00000003.sdmp, 27i42a6Qag.exe, 00000000.00000000.1205590236.0000000000423000.00000002.00000001.01000000.00000003.sdmp, atjdeae, 0000000D.00000002.1515576830.0000000000423000.00000002.00000001.01000000.00000005.sdmp, atjdeae, 0000000D.00000000.1458585616.0000000000423000.00000002.00000001.01000000.00000005.sdmp
                          Source: Binary string: C:\A\18\s\PCbuild\amd64\select.pdb source: D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: C:\A\18\s\PCbuild\amd64\_tkinter.pdb source: D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: !C:\rogajehanovo\vezaviku\xoyi.pdb source: 27i42a6Qag.exe, 00000000.00000002.1282558748.0000000000423000.00000002.00000001.01000000.00000003.sdmp, 27i42a6Qag.exe, 00000000.00000000.1205590236.0000000000423000.00000002.00000001.01000000.00000003.sdmp, atjdeae, 0000000D.00000002.1515576830.0000000000423000.00000002.00000001.01000000.00000005.sdmp, atjdeae, 0000000D.00000000.1458585616.0000000000423000.00000002.00000001.01000000.00000005.sdmp
                          Source: Binary string: C:\A\18\s\PCbuild\amd64\_bz2.pdb source: D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: C:\A\18\s\PCbuild\amd64\_hashlib.pdb source: D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D09E4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,16_2_00007FF7285D09E4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C6744 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,16_2_00007FF7285C6744
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C6744 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,16_2_00007FF7285C6744
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285B7850 FindFirstFileExW,FindClose,16_2_00007FF7285B7850
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00646CD1 _free,_free,FindFirstFileExW,18_2_00646CD1
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00646D85 FindFirstFileExW,FindNextFileW,FindClose,18_2_00646D85
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285D09E4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,22_2_00007FF7285D09E4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\Local\Temp\_MEI19202\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\Local\Temp\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\Local\Temp\_MEI19202\tcl\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\Local\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\

                          Networking

                          barindex
                          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.46.59 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 34.143.166.163 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 104.198.2.251 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.45.142 443Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 34.94.245.237 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.88.149 443Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 185.12.79.25 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 186.13.17.220 80Jump to behavior
                          Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 91.215.85.17 80
                          Source: Malware configuration extractorURLs: dayfarrichjwclik.fun
                          Source: Malware configuration extractorURLs: neighborhoodfeelsa.fun
                          Source: Malware configuration extractorURLs: ratefacilityframw.fun
                          Source: Malware configuration extractorURLs: reviveincapablewew.pw
                          Source: Malware configuration extractorURLs: cakecoldsplurgrewe.pw
                          Source: Malware configuration extractorURLs: opposesicknessopw.pw
                          Source: Malware configuration extractorURLs: politefrightenpowoa.pw
                          Source: Malware configuration extractorURLs: http://pirateking.online/tmp/index.php
                          Source: Malware configuration extractorURLs: http://piratia.pw/tmp/index.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://henkes-lack-union.de/admin.phpaz6yl4mmfco6oqxsqd.onion
                          Source: Joe Sandbox ViewIP Address: 81.169.145.149 81.169.145.149
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <div class="bottom-meta-wrap"><ul class="off-canvas-social-links mobile-only"><li><a target="_blank" href="https://www.facebook.com/B1-Autohaus-776460022482789"><i class="fa fa-facebook"></i> </a></li><li><a target="_blank" href="https://www.instagram.com/b1automobile.de/"><i class="fa fa-instagram"></i> </a></li><li><a target="_blank" href="https://wa.me/491794731374"><i class="fa fa-whatsapp"></i> </a></li></ul></div><!--/bottom-meta-wrap--></div> <!--/inner-wrap--> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <div class="button_social_group"><ul><li id="social-in-menu"><a target="_blank" href="https://www.facebook.com/B1-Autohaus-776460022482789"><i class="fa fa-facebook"></i> </a><a target="_blank" href="https://www.instagram.com/b1automobile.de/"><i class="fa fa-instagram"></i> </a><a target="_blank" href="https://wa.me/491794731374"><i class="fa fa-whatsapp"></i> </a></li></ul></div> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: </div> <!-- end .et_pb_widget --><div id="text-3" class="et_pb_widget widget_text"><div class="textwidget"><a href="https://www.facebook.com/pages/Nokia-Shop-Potsdam/122783417754826"><img class="alignleft wp-image-1068 size-full" src="https://www.mfc-potsdam.de/wp-content/uploads/2015/04/Facebook_logo.jpg" alt="Facebookfull" width="105" height="40" /></a></div> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <a href="https://www.facebook.com/Varga-Marine-400720953869424/" class="icon"> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <div id="social-icons"><ul><li><a title="Facebook" href="https://www.facebook.com/InvemaKreuztal" target="_blank"><i class="fa fa-facebook"></i></a></li><li><a title="Youtube" href="https://www.youtube.com/user/InvemaKreuztal" target="_blank"><i class="fa fa-youtube"></i></a></li><li><a title="Instagram" href="https://www.instagram.com/invemakreuztal/" target="_blank"><i class="fa fa-instagram"></i></a></li><li><a title="Email" href="mailto:info@invema-ev.de"><i class="fa fa-envelope"></i></a></li></ul></div> </div> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <div id="social-icons"><ul><li><a title="Facebook" href="https://www.facebook.com/InvemaKreuztal" target="_blank"><i class="fa fa-facebook"></i></a></li><li><a title="Youtube" href="https://www.youtube.com/user/InvemaKreuztal" target="_blank"><i class="fa fa-youtube"></i></a></li><li><a title="Instagram" href="https://www.instagram.com/invemakreuztal/" target="_blank"><i class="fa fa-instagram"></i></a></li><li><a title="Email" href="mailto:info@invema-ev.de"><i class="fa fa-envelope"></i></a></li></ul></div> </div> equals www.youtube.com (Youtube)
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <div id="social-icons"><ul><li><a title="Facebook" href="https://www.facebook.com/InvemaKreuztal" target="_blank"><i class="fa fa-facebook"></i></a></li><li><a title="Youtube" href="https://www.youtube.com/user/InvemaKreuztal" target="_blank"><i class="fa fa-youtube"></i></a></li><li><a title="Instagram" href="https://www.instagram.com/invemakreuztal/" target="_blank"><i class="fa fa-instagram"></i></a></li><li><a title="Email" href="mailto:info@invema-ev.de"><i class="fa fa-envelope"></i></a></li></ul></div> </div> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <div id="social-icons"><ul><li><a title="Facebook" href="https://www.facebook.com/InvemaKreuztal" target="_blank"><i class="fa fa-facebook"></i></a></li><li><a title="Youtube" href="https://www.youtube.com/user/InvemaKreuztal" target="_blank"><i class="fa fa-youtube"></i></a></li><li><a title="Instagram" href="https://www.instagram.com/invemakreuztal/" target="_blank"><i class="fa fa-instagram"></i></a></li><li><a title="Email" href="mailto:info@invema-ev.de"><i class="fa fa-envelope"></i></a></li></ul></div> </div> equals www.youtube.com (Youtube)
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <a class="facebook" href="https://www.facebook.com/firstclassandmore" target="_blank"><i class="fa fa-facebook"></i> <span>Facebook</span></a> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <a class="linkedin" href="https://www.linkedin.com/company/first-class-and-more/" target="_blank"><i class="fa fa-linkedin"></i> <span>LinkedIn</span></a> equals www.linkedin.com (Linkedin)
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <a href="https://www.facebook.com/AutohausHelmering/?__tn__=%2Cd%2CP-R&eid=ARAaI-YouLcRIIDqC2JT7nKTBujYqWfthRLew-_mYbEGV031zADd4kLL1zHEvsDrE6KqZsrrKDqDyaW4" target="_blank" rel="noopener">Facebook</a><br><a href="https://www.instagram.com/autohaus_helmering/" title="Instagram autohaus Helmering">Instagram</a> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <a href="http://www.youtube.com/plopsaparcs" title="youtube" class="social__link social__link--youtube"> equals www.youtube.com (Youtube)
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: <a href="https://www.facebook.com/holidayparkofficial/" title="facebook" class="social__link social__link--facebook"> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ":"consent","dataProcessingInCountries":[],"dataProcessingInCountriesSpecialTreatments":[],"technicalDefinitions":[{"type":"http","name":"tidio_state_*","host":".tidio.com","durationUnit":"y","isSessionDuration":true,"purpose":"","duration":0},{"type":"http","name":"tidio_state_*","host":".tidiochat.com","durationUnit":"y","isSessionDuration":true,"purpose":"Zur Benutzung des Chats auf der Website","duration":0}],"codeDynamics":[],"providerPrivacyPolicyUrl":"https:\/\/www.tidio.com\/privacy-policy\/","providerLegalNoticeUrl":"","tagManagerOptInEventName":"","tagManagerOptOutEventName":"","codeOptIn":"","executeCodeOptInWhenNoTagManagerConsentIsGiven":false,"codeOptOut":"","executeCodeOptOutWhenNoTagManagerConsentIsGiven":false,"deleteTechnicalDefinitionsAfterOptOut":false,"codeOnPageLoad":"","presetId":""},{"id":4485,"name":"Facebook","purpose":"Wird verwendet, um Facebook-Inhalte auf der Website anzuzeigen.","providerContact":{"phone":"","email":"","link":""},"isProviderCurrentWebsite":false,"provider":"Meta Platforms, Inc.","uniqueName":"facebook","isEmbeddingOnlyExternalResources":true,"legalBasis":"consent","dataProcessingInCountries":[],"dataProcessingInCountriesSpecialTreatments":[],"technicalDefinitions":[{"type":"http","name":"","host":"","durationUnit":"y","isSessionDuration":false,"purpose":"","duration":0}],"codeDynamics":[],"providerPrivacyPolicyUrl":"https:\/\/facebook.com\/privacy","providerLegalNoticeUrl":"https:\/\/facebook.com\/terms.php","tagManagerOptInEventName":"","tagManagerOptOutEventName":"","codeOptIn":"","executeCodeOptInWhenNoTagManagerConsentIsGiven":false,"codeOptOut":"","executeCodeOptOutWhenNoTagManagerConsentIsGiven":false,"deleteTechnicalDefinitionsAfterOptOut":false,"codeOnPageLoad":"","presetId":""},{"id":4022,"name":"Google Maps","purpose":"Google Maps stellt Karten auf der Website als Iframe oder \u00fcber JavaScript direkt als Teil der Website eingebettet dar. Auf dem Client des Nutzers werden keine Cookies im technischen Sinne gesetzt, jedoch werden technische und personenbezogene Daten wie die IP-Adresse vom Client an den Server des Diensteanbieters \u00fcbermittelt, um die Nutzung des Dienstes zu erm\u00f6glichen.","providerContact":{"phone":"","email":"","link":""},"isProviderCurrentWebsite":false,"provider":"Google Ireland Limited","uniqueName":"google-maps","isEmbeddingOnlyExternalResources":false,"legalBasis":"consent","dataProcessingInCountries":[],"dataProcessingInCountriesSpecialTreatments":[],"technicalDefinitions":[{"type":"http","name":"NID-Cookie","host":"google.com","duration":1,"durationUnit":"y","isSessionDuration":false,"purpose":"Nutzerinformationen speichern"}],"codeDynamics":[],"providerPrivacyPolicyUrl":"https:\/\/policies.google.com\/privacy?hl=de","providerLegalNoticeUrl":"","tagManagerOptInEventName":"","tagManagerOptOutEventName":"","codeOptIn":"","executeCodeOptInWhenNoTagManagerConsentIsGiven":false,"codeOptOut":"","executeCodeOptOutWhenNoTagManagerConsentIsGiven":false,"deleteTech
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: -200-px-2.png"/><meta property="article:publisher" content="https://www.facebook.com/insti equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: E.com","durationUnit":"y","isSessionDuration":true,"purpose":"","duration":0},{"type":"http","name":"tidio_state_*","host":".tidiochat.com","durationUnit":"y","isSessionDuration":true,"purpose":"Zur Benutzung des Chats auf der Website","duration":0}],"codeDynamics":[],"providerPrivacyPolicyUrl":"https:\/\/www.tidio.com\/privacy-policy\/","providerLegalNoticeUrl":"","tagManagerOptInEventName":"","tagManagerOptOutEventName":"","codeOptIn":"","executeCodeOptInWhenNoTagManagerConsentIsGiven":false,"codeOptOut":"","executeCodeOptOutWhenNoTagManagerConsentIsGiven":false,"deleteTechnicalDefinitionsAfterOptOut":false,"codeOnPageLoad":"","presetId":""},{"id":4485,"name":"Facebook","purpose":"Wird verwendet, um Facebook-Inhalte auf der Website anzuzeigen.","providerContact":{"phone":"","email":"","link":""},"isProviderCurrentWebsite":false,"provider":"Meta Platforms, Inc.","uniqueName":"facebook","isEmbeddingOnlyExternalResources":true,"legalBasis":"consent","dataProcessingInCountries":[],"dataProcessingInCountriesSpecialTreatments":[],"technicalDefinitions":[{"type":"http","name":"","host":"","durationUnit":"y","isSessionDuration":false,"purpose":"","duration":0}],"codeDynamics":[],"providerPrivacyPolicyUrl":"https:\/\/facebook.com\/privacy","providerLegalNoticeUrl":"https:\/\/facebook.com\/terms.php","tagManagerOptInEventName":"","tagManagerOptOutEventName":"", equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: glichen","publisher":{"@id":"https://invema-ev.de/#organization"},"alternateName":"Invema","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://invema-ev.de/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https://invema-ev.de/#organization","name":"Invema e.V.","alternateName":"Invema","url":"https://invema-ev.de/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https://invema-ev.de/#/schema/logo/image/","url":"https://invema-ev.de/wp-content/uploads/2016/02/cropped-icon.png","contentUrl":"https://invema-ev.de/wp-content/uploads/2016/02/cropped-icon.png","width":512,"height":512,"caption":"Invema e.V."},"image":{"@id":"https://invema-ev.de/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/InvemaKreuztal","https://www.instagram.com/invemakreuztal/"]}]}</script> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/Varga-Marine-400720953869424/" class="icon"> equals www.facebook.com (Facebook)
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abs-gmbh.de/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abs-gmbh.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abs-gmbh.de/TF-8
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abs-gmbh.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abs-gmbh.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abs-gmbh.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abs-gmbh.de/wp-login.php1CR
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abs-gmbh.de/wp-login.phpKC
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abs-gmbh.de/wp-login.phpxC
                          Source: D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aia.startssl.com/certs/ca.crt0
                          Source: D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aia.startssl.com/certs/sca.code3.crt06
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ambros-mobil.de/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ambros-mobil.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ambros-mobil.de/administrator/index.phpI
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anwalt-wickede.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anwalt-wickede.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anwalt-wickede.de/administrator//
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anwalt-wickede.de/administrator/ms03):
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anwalt-wickede.de/dmin/p
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anwalt-wickede.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anwalt-wickede.de/wp-admin/~e
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EC5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060578000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A78000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B03000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E83000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468AA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469A8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c5F
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c7M0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7cDM
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7cc
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7cgH
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7clEg
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://auditeam-bonn.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://auditeam-bonn.de/PhpMyAdmin/h
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://auditeam-bonn.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://auditeam-bonn.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://auditeam-bonn.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://auditeam-bonn.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://autohaus-helmering.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://autohaus-helmering.de/PhpMyAdmin/onds
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://autohaus-helmering.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://autohaus-helmering.de/administrator/index.phpm
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://automobify.de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aw-electronic.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aw-electronic.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aw-electronic.de/administrator/h=
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aw-electronic.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aw-electronic.de/phpMyAdmin/Y
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aw-electronic.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aw-electronic.de/phpmyadmin/P
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b1-automobile.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b1-automobile.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b1-automobile.de/phpMyAdmin/.comeN
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b1-automobile.de/phpMyAdmin//q
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b1-automobile.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b1-automobile.de/phpmyadmin/outlook.com
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b1-automobile.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b1-automobile.de/wp-login.php9aab025578
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://b1-automobile.de/wp-login.phpQ1Ia
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/6.de
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/PhpMyAdmin/e.dQ
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/phpMyAdmin/1
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/phpMyAdmin/1_
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/pma/Admin/;
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/t=iso-8859-1
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/wp-admin/hpst
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baihu.de/wp-login.phpI
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://beckschaefer.de/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://beckschaefer.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://beckschaefer.de/admin/9
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://beckschaefer.de/admin/Z
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://beckschaefer.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://beckschaefer.de/administrator/859-1
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://beckschaefer.de/administrator/hpq
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://beckschaefer.de/wG
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bertz24.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bertz24.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bertz24.de/admin/B(
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bertz24.de/admin/Q
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bertz24.de/admin/luegere(K
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bertz24.de/admin/t(z
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bertz24.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bertz24.de/x
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://boergel.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://boergel.de/PhpMyAdmin/d
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://boergel.de/PhpMyAdmin/f
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://boergel.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://boergel.de/admin.php995K
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://boergel.de/admin.phpostA
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://boergel.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://boergel.de/phpmyadmin/59kVY
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://brinco.de/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://brinco.de/I
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://brinco.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://brinco.de/wp-admin/ator
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://brinco.de/wp-admin/e10
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://browsehappy.com/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/PhpMyAdmin/l9
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/admin.phpI
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/admin.phpj
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/phpMyAdmin//uB
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/phpMyAdmin/park.dephpAj
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bs-mietpark.de/pma/h
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bwh-buecker.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bwh-buecker.de/PhpMyAdmin/GW
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bwh-buecker.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bwh-buecker.de/administrator/index.phpB#
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                          Source: explorer.exe, 00000002.00000000.1264685341.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1266580071.0000000008F7B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crt0
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.thawte.com/ThawteTLSRSACAG1.crt
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.thawte.com/ThawteTLSRSACAG1.crt.deJ
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E44000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.thawte.com/ThawteTLSRSACAG1.crt0
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl0
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crlGw
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.t5=
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.thawte.com/ThawteTLSRSACAG1.crl
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E44000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E54000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.thawte.com/ThawteTLSRSACAG1.crl0p
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.thawte.com/ThawteTLSRSACAG1.crl1):
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.thawte.com/ThawteTLSRSACAG1.crld
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.thawte.com/ThawteTLSRSACAG1.crlt
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046CBE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.godaddy.com/repository/0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006044F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046CBE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006044F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crtYO
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.godaddy.com/repository/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.godaddy.com/repository//CN=Go
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046CBE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.00000000609ED000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604FC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000609ED000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604FC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.godaddy.com/repository/1301
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://certs.godaddy.com/repository/Q
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/PhpMyAdmin/b
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/phpmyadmin/A
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/pma/Admin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/wp-login.phpW
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cgforge.de/wp-login.phpY
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clevervideo.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clevervideo.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clevervideo.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clevervideo.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clevervideo.de/administrator/index.phpc
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clevervideo.de/administrator/index.phpv
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clickon.de/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clickon.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clickon.de/administrator/mp
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://clickon.de/dmin/3/20i
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/admin59-1v
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/admin:
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/adminin/p-
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/phpMyAdmin/KQy
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/phpMyAdmin/UQ
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://compdesk.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060995000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org#
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EC5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060578000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A78000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B03000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E83000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468AA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469A8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046AF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org1
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.orgin
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607CB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C14000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605AC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl(B
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000605AC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl/CPS
                          Source: CAC0.exe, 0000000F.00000003.2292296836.000000006070B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604BD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F84000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000005F65000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006095F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046AB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060846000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BAA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061018000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004697D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlU
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000605AC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlm
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlncFo
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlod
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlpt
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlptyMj
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlq
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crlx5
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.godaddy.com/gdig2s1-5094.crl
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046CBE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.godaddy.com/gdig2s1-5094.crl0
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.godaddy.com/gdig2s1-5094.crlC
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046CBE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.00000000609ED000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000609ED000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607CB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EC5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060578000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A78000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B03000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E83000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468AA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469A8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crlM
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crlV
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crlX
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crlY
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crlp
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crls
                          Source: D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.startssl.com/sca-code3.crl0#
                          Source: D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.startssl.com/sfsca.crl0f
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C14000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605AC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl
                          Source: explorer.exe, 00000002.00000000.1264685341.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1266580071.0000000008F7B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                          Source: CAC0.exe, 0000000F.00000003.2292296836.000000006072B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046968000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0=
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D46000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D46000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0c
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000605AC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl=
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crlNw
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl0H
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                          Source: explorer.exe, 00000002.00000000.1264685341.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1266580071.0000000008F7B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/RapidSSLGlobalTLSRSA4096SHA2562022CA1.crl0
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://croky.be
                          Source: CAC0.exe, 0000000F.00000003.2292296836.000000006070B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604BD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F84000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060846000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csiny.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csiny.de/PhpMyAdmin/er-
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csiny.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csiny.de/admin/F
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://degen-family.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://degen-family.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://degen-family.de/administrator//
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://derholzwurm-bauberatung.de/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://derholzwurm-bauberatung.de/;vY
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://derholzwurm-bauberatung.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://desmetal.de/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://desmetal.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://desmetal.de/admind
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://desmetal.de/admine.
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://desmetal.de/admine..
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://desmetal.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://desmetal.de/administrator/T
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://desmetal.de/dmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://did.mat.uni-bayreuth.de/~vsg/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/U
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/phpmyadmin/hP
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/wp-login.php5
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://die-packende-werbung.de/wp-login.phpr/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dindings-paradies.de/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dindings-paradies.de/H
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dindings-paradies.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dindings-paradies.de/administrator/index.php-
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dkorten.de/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dkorten.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dkorten.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dkorten.de/admin.phpi
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dkorten.de/admind
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dkorten.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dkorten.de/adminl.de:46
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://dkorten.de/dmin/d
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs-op.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs-op.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs-op.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs-op.de/administrator/index.phpems.de
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMDJ8fHx8fHw2NTg0NGI4ODVmOWZhfH
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI4ODk0MzQ0fH
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004688D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI4Yzg5YTdkfH
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI4ZDAwY2Q3fH
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004693F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI4ZTA1NGM4fH
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI4ZTljNGMwfH
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D34000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D34000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI5MTE1Y2M4fH
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI5MjExZjlhfH
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/administrator/index.phpsm
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/i
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/pma/t%z
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ebz-mtk.de/wp-login.phpz
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://edv-jupiter.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://edv-jupiter.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://edv-jupiter.de/n.de:21
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://edv-jupiter.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://edv-jupiter.de/phpMyAdmin/nik.de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://edv-jupiter.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://edv-jupiter.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://edv-jupiter.de/pma/-1FG
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://edv-jupiter.de/pma/n/MG
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://enerpremium.de/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://enerpremium.de/8
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://enerpremium.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://enerpremium.de/PhpMyAdmin/8S1
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://enerpremium.de/PhpMyAdmin/min/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://enerpremium.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://enerpremium.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://enerpremium.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004684A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://esperanza-tours.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004684A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://esperanza-tours.de/PhpMyAdmin/0
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://esperanza-tours.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://esperanza-tours.de/admin&C
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://esperanza-tours.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://esperanza-tours.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://esperanza-tours.de/pma/z
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/admin9%
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/adminIC
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607CB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/administrator/index.phpHK
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/administrator/w
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/admins%q
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://etallbau-renner.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ev-stadtmission.de/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ev-stadtmission.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ev-stadtmission.de/phpMyAdmin/min/e
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ev-stadtmission.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ev-stadtmission.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ev-stadtmission.de/wp-login.phpa
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://findibus.de/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://findibus.de/er.dec
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://findibus.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://findibus.de/phpmyadmin/38_
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://findibus.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://findibus.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://findibus.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://first-class-and-more.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://first-class-and-more.de/PhpMyAdmin/J
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://first-class-and-more.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://first-class-and-more.de/phpMyAdmin/$0U
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://first-class-and-more.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://first-class-and-more.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://first-class-and-more.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://first-class-and-more.de/wp-login.php/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://first-class-and-more.de/wp-login.phpphp
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleischmann-fam.de/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleischmann-fam.de/2222
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleischmann-fam.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleischmann-fam.de/adminB
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fleischmann-fam.de/adminC
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flugplatzmuseumcottbus.de/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flugplatzmuseumcottbus.de/01934A5(open)8
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flugplatzmuseumcottbus.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flugplatzmuseumcottbus.de/phpMyAdmin/GV
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flugplatzmuseumcottbus.de/phpMyAdmin/h
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flugplatzmuseumcottbus.de/phpMyAdmin/min/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flugplatzmuseumcottbus.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flugplatzmuseumcottbus.de/wp-admin/.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://flugplatzmuseumcottbus.de/wp-admin/hpi
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fonts.googleapis.com/css?family=Open
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://freshface.net
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaestehauspflueger.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaestehauspflueger.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaestehauspflueger.de/admine
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaestehauspflueger.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaestehauspflueger.de/administrator/a
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaestehauspflueger.de/administrator/hp
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaestehauspflueger.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaestehauspflueger.de/d
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://galabau-mg.de/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://galabau-mg.de/-8859-1
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://galabau-mg.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://galabau-mg.de/phpMyAdmin/min/c.deJm
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://galabau-mg.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://galabau-mg.de/wp-login.phptor/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaukler.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaukler.de/PhpMyAdmin/0
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaukler.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaukler.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaukler.de/administrator/MT
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaukler.de/administrator/P
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gaukler.de/administrator/tor/index.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gidl.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gidl.de/PhpMyAdmin/-1
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gidl.de/PhpMyAdmin/zip
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A78000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gidl.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gidl.de/admin/de/admini
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gidl.de/admin/s.de/phpmz
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gidl.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gidl.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gidl.de/wp-admin/qAw
                          Source: CAC0.exe, 0000000F.00000003.2297950370.00000000606EB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BAC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://gmpg.org/xfn/11
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/adminD9N
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/adminG
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/phpMyAdmin/5
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/phpMyAdmin/Y
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/phpmyadmin/_
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/pma/.145.165)
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://goettinger-bauelemente.de/pma/yAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://graf-gebaeudetechnik.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://graf-gebaeudetechnik.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://graf-gebaeudetechnik.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://graf-gebaeudetechnik.de/admin/859-1
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://graf-gebaeudetechnik.de/adminH
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://graf-gebaeudetechnik.de/adminphp
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://graf-gebaeudetechnik.de/adminvt
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hachtmann.de/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hachtmann.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hachtmann.de/admin.de
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hachtmann.de/adminde:99
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hachtmann.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hachtmann.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hachtmann.de/administrator/index.phphv
                          Source: CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hachtmann.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hdn-gmbh.de/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hdn-gmbh.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hdn-gmbh.de/administrator/admin/L
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hdn-gmbh.de/dmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hdn-gmbh.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hdn-gmbh.de/phpMyAdmin/l)B
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://henkes-lack-union.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://henkes-lack-union.de/admin.phpaz6yl4mmfco6oqxsqd.onion
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://henkes-lack-union.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://henkes-lack-union.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://herbert-halfmann.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://herbert-halfmann.de/admin22yZ
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://herbert-halfmann.de/adminP
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://herbert-halfmann.de/adminmilliseconds
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://herbert-halfmann.de/adminrk.de:443
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/-8n
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/22
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/phpMyAdmin/iksindelfingen.phpLAIN
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/phpMyAdmin/in/X
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/phpmyadmin/netz.de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hohl-optik.de/pma/S
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://holidaypark.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://holidaypark.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://holidaypark.de/administrator/index.php2
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://holidaypark.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://holidaypark.de/phpmyadmin/min/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://holidaypark.de/pies.d
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://holidaypark.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://holidaypark.de/wp-login.phpGIN
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://holidaypark.de/wp-login.phpt
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/administrator/index.phpP
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/phpMyAdmin/i
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/phpmyadmin/u
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/pma/deU
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ib-dahlke.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ifdnzact.com/?dn=csiny.de&pid=9PO755G95
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://imagro.de/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://imagro.de/=iso-8895-15
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://imagro.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://imagro.de/PhpMyAdmin//G#
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://imagro.de/PhpMyAdmin/~
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://imagro.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://imagro.de/wp-login.php0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A01000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061025000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604CD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004684F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://img.sedoparking.com
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://intensivmedicus.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://intensivmedicus.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://intensivmedicus.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://intensivmedicus.de/admin/P
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://intensivmedicus.de/admin/php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://intensivmedicus.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invema-ev.de/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invema-ev.de/d
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invema-ev.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invema-ev.de/wp-login.phpede.de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invema-kreuztal.de/datenschutzerklaerung/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invema-kreuztal.de/der-verein/mitglied-werden//
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invema-kreuztal.de/der-verein/spendenkonto//
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://invema-kreuztal.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BF8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BF8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jegasoft.de
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jentzsch.de/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jentzsch.de/.de
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jentzsch.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jentzsch.de/admin.php6U4
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jentzsch.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jentzsch.de/administrator/.de.deV=
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jentzsch.de/administrator/n/M=2
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-admin/hpL
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-content/et-cache/3583/et-core-unified-cpt-3583-17011952823775.min
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-content/et-cache/global/et-divi-customizer-global-17011952823775.
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-content/themes/Divi-child/style.css?ver=4.9.7
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-content/themes/Divi/core/admin/fonts/modules.ttf
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-content/themes/Divi/core/admin/js/common.js?ver=4.9.7
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-content/themes/Divi/js/custom.unified.js?ver=4.9.7
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-content/themes/Divi/style.css?ver=5.7.10
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-includes/css/dist/block-library/style.min.css?ver=5.7.10
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-includes/js/jquery/jquery.min.js?ver=3.5.1
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-includes/js/wp-embed.min.js?ver=5.7.10
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/wp-includes/wlwmanifest.xml
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joachim-schwarzenberg.de/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joerndettmer.de/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joerndettmer.de/wp-content/plugins/cookie-notice/css/front.min.css?ver=2.4.13
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joerndettmer.de/wp-content/plugins/cookie-notice/js/front.min.js?ver=2.4.13
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joerndettmer.de/wp-content/themes/omega/js/html5.js
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joerndettmer.de/wp-content/themes/omega/style.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joerndettmer.de/wp-includes/css/dist/block-library/style.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joerndettmer.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joerndettmer.de/wp-login.php/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://joerndettmer.de/wp-login.php/G
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jubla.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jubla.de//admin/e
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jubla.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jubla.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jubla.de/admin/.de/admi
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jubla.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kalyta.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kalyta.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000607F6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kalyta.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kalyta.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kalyta.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kalyta.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kc-fans.de/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kc-fans.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kc-fans.de/administrator/index.phpN
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kc-fans.de/administrator/index.php_
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kc-fans.de/administrator/index.phpe9
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://khbeyerle.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://khbeyerle.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://khbeyerle.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://khbeyerle.de/wp-login.php/index.phpauberatung.de
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://khbeyerle.de/wp-login.php2
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://khbeyerle.de/wp-login.phpO
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kit.elektrowaermetechnik.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kit.elektrowaermetechnik.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kit.elektrowaermetechnik.de/administrator/index.phpEnc
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kit.elektrowaermetechnik.de/administrator/index.phpKB
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kit.elektrowaermetechnik.de/administrator/index.phpb
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kit.elektrowaermetechnik.de/administrator/index.phprB
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060788000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://klaus-wiechers.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://klaus-wiechers.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://klaus-wiechers.de/administrator/index.php0U
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://klaus-wiechers.de/administrator/index.phpQ
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://koeln-stadt.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://koeln-stadt.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://koeln-stadt.de/PhpMyAdmin/80
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://koeln-stadt.de/pS
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://koeln-stadt.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://koeln-stadt.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://koeln-stadt.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://koeln-stadt.de/wp-login.php%
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://koeln-stadt.de/wp-login.phpe.de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/PhpMyAdmin/=A
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/PhpMyAdmin/k.de
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/phpMyAdmin/er.de0):
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/phpmyadmin/-
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/pma/(
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/wp-admin/hpP2
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunstflieger.de/wp-admin/hpr.deA
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunz-ol.de/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunz-ol.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunz-ol.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunz-ol.de/admin/d
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunz-ol.de/admind
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunz-ol.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunz-ol.de/administrator/%Vz
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://kunz-ol.de/administrator/2E315B0FN
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lafar.de/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lafar.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lafar.de/administrator/index.phpY
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lafar.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lafar.de/phpmyadmin/A
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lafar.de/phpmyadmin/Q
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lafar.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lasttrans.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lasttrans.de/wp-login.phpstrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lasttrans.de/wp-login.phpv
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lavista.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lavista.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lavista.de/PhpMyAdmin/y
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lavista.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lavista.de/administrator/index.phpK
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lavista.de/administrator/index.phpP
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lavista.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lavista.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lavista.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://leere.seite
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://loewen-sprudel.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://loewen-sprudel.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://loewen-sprudel.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://loewen-sprudel.de/phpmyadmin/(
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://loewen-sprudel.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://loewen-sprudel.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://luehrmann-web.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://luehrmann-web.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://luehrmann-web.de/administrator/.phppV
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://luehrmann-web.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mandyundmartin.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mandyundmartin.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mandyundmartin.de/administrator/eY
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mandyundmartin.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mandyundmartin.de/administrator/index.phpA
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mandyundmartin.de/dmin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://manitu.de/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://manitu.de/e
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://manitu.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://manitu.de/phpmyadmin/a
                          Source: CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://manitu.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://manitu.de/wp-login.php.Z
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://manitu.de/wp-login.phpH
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mark-net.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mark-net.de/administrator/index.php(v0
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://maschinenhandel-jung.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://maschinenhandel-jung.de/PhpMyAdmin/):
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://maschinenhandel-jung.de/PhpMyAdmin/=jY
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://maschinenhandel-jung.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://matrix-cms.de/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://maxtek.de/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://maxtek.de/1
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mediathek-online.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mfc-potsdam.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mfc-potsdam.de/phpMyAdmin/min/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mfc-potsdam.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mit-kaphengst.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mit-kaphengst.de/adminF
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mnz-stbg.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mnz-stbg.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mnz-stbg.de/dmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://motorad-eu.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://motorad-eu.de/administrator/e-packende-werbung.de
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://motorad-eu.de/administrator/i
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://narcotic-music.de/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://narcotic-music.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://narcotic-music.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://narcotic-music.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://narcotic-music.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://narcotic-music.de/administrator/index.phpoAcc
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://narcotic-music.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://narcotic-music.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/P
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/administrator/er
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netassist-gmbh.de/wp-login.php?XP
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netclue.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netclue.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netclue.de/pma/_y
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/PhpMyAdmin/e:80
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/admin.phpbSk
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/admin.phpq
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/wp-admin/hp;
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/wp-admin/hp?
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://netcom-systems.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com-A
                          Source: CAC0.exe, 0000000F.00000003.2292296836.000000006070B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604BD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F84000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000005F65000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046AB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060846000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BAA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061018000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004697D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B03000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0.
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com1&
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com3Y
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com5
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.comC
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.comO
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.comR/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.comeN
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.comer
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.comi
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.como
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com(11):
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com):
                          Source: explorer.exe, 00000002.00000000.1264685341.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1266580071.0000000008F7B000.00000004.00000001.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                          Source: CAC0.exe, 0000000F.00000003.2292296836.000000006072B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046968000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D46000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E44000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D46000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0B
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0Q
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comeN
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comk
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comq
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.godaddy.com/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046CBE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006044F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.godaddy.com/0
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046CBE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.00000000609ED000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000609ED000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.godaddy.com/05
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.godaddy.com/T
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061061000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0#
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060846000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BAA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004697D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060917000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0)
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000604BD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061018000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0/
                          Source: CAC0.exe, 0000000F.00000003.2292296836.000000006070B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F84000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060432000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com05
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.comAgent:
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.comS
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.comb0af32n9
                          Source: D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.startssl.com00
                          Source: D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.startssl.com07
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D74000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ogp.me/ns#
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ogp.me/ns/fb#
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://otman.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://otman.de/admine.de/pma/%
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://otman.de/adminma/C
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://otman.de/de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://otman.de/de/late
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://palmen-boote.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://palmen-boote.de/administrator/0DB
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pchess.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pchess.de/admin.phpin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pchess.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pchess.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pfe-berlin.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pfe-berlin.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pfe-berlin.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pfe-berlin.de/admin4X
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pfe-berlin.de/adminN
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pfe-berlin.de/adminin/W
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pialu.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pialu.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pialu.de/administrator/Z&Q
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pialu.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pialu.de/administrator/index.php#
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pialu.de/administrator/xQN
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pialu.de/eitung.de
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://polyklima.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://polyklima.de/-admin/D
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://polyklima.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://polyklima.de/wp-admin/hpr/index.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://polyklima.de/wp-admin/q
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://prothe.de/admin
                          Source: D89C.exeString found in binary or memory: http://python.org/dev/peps/pep-0263/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468E5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046AF1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A88000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/(r
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607DC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EC5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468E5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004689E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B03000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D46000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E83000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468AA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0#
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/07
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A69000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0l
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0o
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046AF1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/1
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/4.0
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/summ
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607DC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EC5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468E5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046AF1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A88000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A69000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://riseurstudio-fach.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://riseurstudio-fach.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://riseurstudio-fach.de/administrator/Ci
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://riseurstudio-fach.de/administrator/Zi
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://riseurstudio-fach.de/yA
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rpm-oldenburg.de/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rpm-oldenburg.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rpm-oldenburg.de/administrator/index.php3
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rpm-oldenburg.de/administrator/index.phpY
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rpm-oldenburg.de/rator/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rw-druck.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rw-druck.de/PhpMyAdmin/SP
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rw-druck.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rw-druck.de/admin/3
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rw-druck.de/admin/4
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://rw-druck.de/admin/9-1l
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060669000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sale.pchess.de
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://scale87.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://scale87.de/admine/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://scale87.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org/CreativeWork/DocumentObject
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org/SiteNavigationElement
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org/WPFooter
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org/WPHeader
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org/WPSideBar
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schema.org/WebPage
                          Source: explorer.exe, 00000002.00000000.1266263648.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.1266274460.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.1265554053.0000000007C70000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schliecker.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schliecker.de/-8859-1
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schliecker.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schliecker.de/admin-1
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schliecker.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schliecker.de/admin.phptx
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schliecker.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schliecker.de/pma/e:2204
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schreib-mal-wieder.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schreib-mal-wieder.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schreib-mal-wieder.de/PhpMyAdmin/eN
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schreib-mal-wieder.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schreib-mal-wieder.de/admin.phpV
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schreib-mal-wieder.de/admin.phpx
                          Source: CAC0.exe, 0000000F.00000003.2296957971.0000000060907000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060907000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060907000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schreib-mal-wieder.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schulze-braak.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schulze-braak.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schulze-braak.de/admini
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schulze-braak.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schulze-braak.de/administrator/ik.de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schulze-braak.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schulze-braak.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://service4success.de
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609CD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000609CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://service4success.de/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://service4success.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://service4success.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://service4success.de/administrator/index.phprieelektro
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609CD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000609CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://service4success.de/index.php?option=com_users&view=remind
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609CD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000609CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://service4success.de/index.php?option=com_users&view=reset
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://silvercrash.freeprojekt.de/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://silvercrash.freeprojekt.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://silvercrash.freeprojekt.de/pma/ima.de
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://silvercrash.freeprojekt.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://silvercrash.freeprojekt.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://silvercrash.freeprojekt.de/wp-admin/phpFI
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/administrator/.phpn)
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/googlefonts.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/phpMyAdmin/on(252)
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/phpMyAdmin/s
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/phpmyadmin/3
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/3d-flipbook-dflip-lite/assets/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/conditional-payments-for-woocommerce/includes/frontend/.
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/cookie-law-info/legacy/public/css/cookie-law-info-gdpr.c
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/cookie-law-info/legacy/public/css/cookie-law-info-public
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/everest-timeline/css/animate.css?ver=2.0.6
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/everest-timeline/css/elegant-icons.css?ver=2.0.6
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/everest-timeline/css/et-frontend.css?ver=2.0.6
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/everest-timeline/css/et-responsive.css?ver=2.0.6
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/everest-timeline/css/fontawesome-all.css?ver=2.0.6
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/everest-timeline/css/jquery.bxslider.css?ver=2.0.6
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/everest-timeline/css/prettyPhoto.css?ver=2.0.6
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/fusion-builder/assets/images/iLightbox/metro-white-skin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/sitepress-multilingual-cms/dist/css/blocks/styles.css?ve
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/sitepress-multilingual-cms/templates/language-switchers/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/superfly-menu/css/superfly-menu.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/plugins/superfly-menu/img/close3.png
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/themes/Avada/assets/css/style.min.css?ver=7.11.3
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-content/uploads/2020/09/sina-spielzeug-gmbh-mobile-yellow.png
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-includes/css/dashicons.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sina-spielzeug.de/wp-login.php/index.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sjh-haustechnik.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sjh-haustechnik.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sjh-haustechnik.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sjh-haustechnik.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareklinik.de/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareklinik.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareklinik.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareklinik.de/dmin/W
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://softwareklinik.de/min/P
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://spyderfahrer.de/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://spyderfahrer.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://spyderfahrer.de/dmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stammswelt.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stammswelt.de/PhpMyAdmin/#
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stammswelt.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stammswelt.de/admin.php&T
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stammswelt.de/admin.phpT&
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stammswelt.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stammswelt.de/administrator/655M
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stammswelt.de/administrator/k.demZ
                          Source: svchost.exe, 00000008.00000002.3817081342.0000024E9BA87000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.3819528169.0000024E9C302000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://standards.iso.org/iso/19770/-2/2009/schema.xsd
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://status.rapidssl.com0
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E44000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E54000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://status.thawte.com0:
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://strontium90.de/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://strontium90.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://strontium90.de/PhpMyAdmin/21
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://strontium90.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://strontium90.de/admin1s(
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://strontium90.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://strontium90.de/pma/s
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://strontium90.de/y
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://student.hebo-privatschule.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://student.hebo-privatschule.de/adminES256-GCM-SHA384
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://student.hebo-privatschule.de/adminphp
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/admin/n/W)
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/administrator/index.phpfkl
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/administrator/rtin.dew
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/phpMyAdmin/995P
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://svane-gmbh.de/pmyadmin/_
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tdea.de/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060613000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060613000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tdea.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tdea.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tdea.de/admin.phpU7
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tdea.de/admin.phphpip
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tdea.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tdea.de/adminF-8
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themes.freshface.net/ark/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themes.muffingroup.com/betheme/wp-content/uploads/2014/06/wood-texture.png);
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://timm24.de/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://timm24.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://timm24.de/admin.php-1p
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://timm24.de/admin.phpillk
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://timm24.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://timm24.de/phpMyAdmin/:P
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tip-edv.de/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tip-edv.de/Z
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tip-edv.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tip-edv.de/administrator/index.php2
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trockenbau-jeknic.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trockenbau-jeknic.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://trockenbau-jeknic.de/adminphp
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                          Source: D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ulrichmohr.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ulrichmohr.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ulrichmohr.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unger-plaidt.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unger-plaidt.de/administrator/36(open)
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/PhpMyAdmin/H
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/e/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/phpMyAdmin/Xj
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/wp-content/uploads/2016/04/favicon.gif
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/wp-content/uploads/2016/04/unikat-logo.jpg
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://unikat-holzverarbeitung.de/wp-login.phpl
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://varga-marine.com
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://varga-marine.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2296957971.0000000060907000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060907000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060907000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://varga-marine.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://varga-marine.de/wp-login.php%
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vlp-lohne.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vlp-lohne.de/PhpMyAdmin/8
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vlp-lohne.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vlp-lohne.de/wp-login.phpde:21
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vlp-lohne.de/wp-login.phpiso-8859-1
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vlp-lohne.de/wp-login.phpotify
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vsgefrees.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vsgefrees.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vsgefrees.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vsgefrees.de/wp-login.php/index.php?
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vsgefrees.de/wp-login.phpnistrator/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://weissingers.de/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://weissingers.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://weissingers.de/dmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wetzel-industrieelektronik.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wetzel-industrieelektronik.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wetzel-industrieelektronik.de/PhpMyAdmin/.de
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wetzel-industrieelektronik.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wetzel-industrieelektronik.de/admin.phpe:
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wetzel-industrieelektronik.de/i
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wetzel-industrieelektronik.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wetzel-industrieelektronik.de/pma/90os
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wetzel-industrieelektronik.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/PhpMyAdmin/AY
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/PhpMyAdmin/de
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/admin.php-login.php1
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/adminin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/admink.deadminN
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/adminphp
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/adminphpO
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wiwi.rwth-aachen.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wohlnick.de/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wohlnick.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wohlnick.de/PhpMyAdmin/w
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wohlnick.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wohlnick.de/wp-admin/hpN
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/pma/Admin/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/pma/Admin/N
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/wp-content/cache/wmac/js/wmac_c99f1f20a5cbad17b39d0f28442a40be.js
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607DC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000607E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/wp-content/plugins/aikit/fe/build/style-index.css
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607DC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000607E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/wp-content/plugins/aikit/includes/openai/chatbot/../../css/bootstrap-icons.css
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607DC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000607E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/wp-content/plugins/aikit/includes/openai/chatbot/../../css/chatbot.css
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/wp-content/themes/jannah/assets/css/plugins/shortcodes.min.css
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/wp-content/themes/jannah/assets/css/style.min.css
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wom87.de/wp-content/themes/jannah/assets/css/widgets.min.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wordpress.org
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wordpress.org/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wpc-consulting.de/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wpc-consulting.de/admin/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wpc-consulting.de/admin/F
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wpc-consulting.de/admin/M
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wpc-consulting.de/k.de/R)
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.aktion-mensch.de
                          Source: explorer.exe, 00000002.00000000.1269434269.000000000C10B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/phpMyAdmin/de
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/AutomobifyWP-master/includes/templates/assets/slick/s
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/AutomobifyWP-master/includes/templates/css/front-styl
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/AutomobifyWP-master/includes/templates/js/front-scrip
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/AutomobifyWP-master/js/jquery-1.11.0.min.js?ver=5.8.8
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/AutomobifyWP-master/js/jquery-migrate-1.2.1.min.js?ve
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.5.6.1
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.5.6.1
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/ga-germanized/assets/css/cookieconsent.css?ver=3.1.1
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/ga-germanized/assets/js/cookieconsent.js?ver=3.1.1
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/ga-germanized/assets/js/gaoptout.js?ver=1.5.5
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060870000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/hcaptcha-for-forms-and-more/assets/images/hcaptcha-di
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/hcaptcha-for-forms-and-more/assets/js/hcaptcha-quform
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/quform/cache/quform.css?ver=1624880171
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/quform/cache/quform.js?ver=1624880171
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/salient-core/js/third-party/touchswipe.min.js?ver=1.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/salient-portfolio/js/third-party/imagesLoaded.min.js?
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/salient-social/css/style.css?ver=1.1
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/plugins/salient-social/js/salient-social.js?ver=1.1
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile-child/style.css?ver=12.1.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/elements/widget-nectar-posts.css?ver=
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/font-awesome.min.css?ver=4.6.4
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/fonts/OpenSans-Bold.woff
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/fonts/OpenSans-Light.woff
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/fonts/OpenSans-Regular.woff
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/fonts/OpenSans-SemiBold.woff
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/grid-system.css?ver=12.1.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/header/header-layout-left.css?ver=12.
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/iconsmind.css?ver=5.8.8
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/off-canvas/slide-out-right-hover.css?
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/plugins/jquery.fancybox.css?ver=3.3.1
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/responsive.css?ver=12.1.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/salient-dynamic-styles.css?ver=88030
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/skin-material.css?ver=12.1.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/css/style.css?ver=12.1.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/js/init.js?ver=12.1.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/js/priority.js?ver=12.1.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/js/third-party/hoverintent.js?ver=1.9
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/js/third-party/jquery.easing.js?ver=1.3
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/js/third-party/jquery.fancybox.min.js?ver
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/js/third-party/jquery.mousewheel.js?ver=3
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/js/third-party/superfish.js?ver=1.4.8
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/js/third-party/transit.js?ver=0.9.9
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-content/themes/b1automobile/js/third-party/waypoints.js?ver=4.0.1
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-includes/css/dist/block-library/style.min.css?ver=5.8.8
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.7
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-includes/js/wp-embed.min.js?ver=5.8.8
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.b1-automobile.de/wp-includes/wlwmanifest.xml
                          Source: svchost.exe, 00000003.00000002.1368147756.000001DE9BE24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060314000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.buecker-kunststoffe.de
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.buecker-kunststoffe.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.buecker-kunststoffe.de/PhpMyAdmin/:
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006044F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.buecker-kunststoffe.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D80000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.compdesk.deadmin
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.compdesk.deadmin90/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.compdesk.depma/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605AC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E44000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E54000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0v
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.domainname.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.elegantthemes.com
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.enerpremium.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.esperanza-tours.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000005FA7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.esperanza-tours.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.flugplatzmuseumcottbus.de/phpmyadmin/
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071A4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foreca.com
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.inklusion-schaffen-wir.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.leuchtstoffhaus.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.loewen-sprudel.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.loewen-sprudel.de/phpMyAdmin/A10
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.loewen-sprudel.de/phpMyAdmin/php
                          Source: D89C.exe, 00000010.00000003.1589511453.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.python.org/dev/peps/pep-0205/
                          Source: D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.startssl.com/0P
                          Source: D89C.exe, 00000010.00000003.1588438152.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.startssl.com/policy0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A41000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tuev-sued.de/ms-zert
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.wordpress.org
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.youtube.com/plopsaparcs
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EC5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B03000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E83000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468AA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469A8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E4F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/3
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/A
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/F9
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/Fi
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/Y
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603A6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/#
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/)
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EC5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C8E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B03000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E83000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468AA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469A8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E4F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/1C
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/PQ
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/WY
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yogajoye.de/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yogajoye.de/0.0.157017
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yogajoye.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yogajoye.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yogajoye.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://a.jimdo.com/app/auth/signin/jumpcms/?page=2255394424
                          Source: CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000005F68000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060319000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C4B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060FA7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abgo.de
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=wise&amp;passive=1209600&amp;osid=1&amp;continue=ht
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008F7B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000605D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605C0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D88000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061018000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061061000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605BF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://andersnoren.se
                          Source: explorer.exe, 00000002.00000000.1266580071.000000000913F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008DA6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
                          Source: explorer.exe, 00000002.00000000.1264685341.0000000007276000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?t
                          Source: CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.w.org/
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.jimstatic.com/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.jimstatic.com/ckies.js.0ebea1f10bb1204e4882.js
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.jimstatic.com/cookieControl.js.19a3c1397bfcee31bfb4.js
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.jimstatic.com/web.js.30196931e46e05701bed.js
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.jimstatic.com/web_oldtemplate.css.484168258c63bd4f69a74e0370dc7ab9.css
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://augenoptiknetz.de/willkommen-bei-hohl-optik
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D46000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://autohaus-helmering.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://autohaus-helmering.de/PhpMyAdmin/max-age=0
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://autohaus-schlaefer.de
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avada.theme-fusion.com/classic-shop/wp-content/uploads/sites/48/2015/09/page_title_bar_bg.pn
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aw-electronic.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aw-electronic.de/phpmyadmin/U
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://b1-automobile.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://b1-automobile.de/phpmyadmin/utlook.comGq;
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://baihu.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://baihu.de/PhpMyAdmin/m
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://baihu.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bestcom.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/area/ajax/modules/xGalerie/xGalerie.css?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/css/custom.css?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/css/editor.css?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/css/global.css?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/css/iBox.css?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/css/style.css?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/de/ajax/navi/~nm.5
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/de/ajax/navi/~nm.5~node.
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/dynamic/dlFile/0ddf3df7e6228e0f65f45f343b1c6da2/TeamViewerQS.exe
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/images/content/MATRIX-CMS.png
                          Source: CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/images/content/MATRIX-N
                          Source: CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/images/content/MATRIX-NN
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/images/content/favicon.ico?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/images/content/logo-fff.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/images/content/logo.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/images/icons/loading.3d.18x15.gif
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/images/layout/trans1x1.gif
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/ajax.class.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/ajaxPopup.class.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/anchor.class.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/base64.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/dimensions.class.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/global.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/iBox.class.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/jQuery/jquery-1.11.1.min.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/layout.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/js/shader.class.js?cv125cf8c7c08c
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/pma/$
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/TeamViewer-Download.200x125-squeeze.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/button_ratgeber_frankfurt_klein.188x62-squeeze.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/icon_finanzierung_blau-1.800x600-aspect.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/icon_rep_ser_weiss-1.800x600-aspect.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/icon_upgrade02_weiss.800x600-aspect.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/internet_icon-1.800x600-aspect.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/kontakt_header.1920x0-crop.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/lenovo-silver.188x62-squeeze.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/netzwerk_icon-1.800x600-aspect.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/oeffnungszeiten_icon_blau.50x0-aspect.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/oeffnungszeiten_icon_weiss-1.50x0-aspect.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/uploads/pictures/resized/telekommunikation_icon-1.800x600-aspect.png
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://brinco.de/wp-login.php#A
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bs-mietpark.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/css/dist/block-library/style.min.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/js/imagesloaded.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/js/jquery/jquery.masonry.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/js/jquery/ui/accordion.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/js/jquery/ui/core.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/js/jquery/ui/progressbar.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/js/jquery/ui/tabs.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/js/masonry.min.js
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.3.2/wp-includes/js/mediaelement/wp-mediaelement.min.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-admin/css/forms.min.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-admin/css/l10n.min.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-admin/css/login.min.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-admin/js/password-strength-meter.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060ECF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-admin/js/user-profile.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-inc
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/css/buttons.min.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/css/dashicons.min.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/js/dist/hooks.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/js/dist/i18n.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/js/dist/vendor/regenerator-runtime.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/js/dist/vendor/wp-polyfill-inert.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/js/dist/vendor/wp-polyfill.min.js
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/js/jquery/jquery.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060ECF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/js/underscore.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060ECF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/js/wp-util.min.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-includes/js/zxcvbn-async.min.js
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/c/6.4.2/wp-incss-css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/p/jetpack/12.7.1/_inc/genericons/genericons/genericons.css
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/p/jetpack/12.7.1/css/jetpack.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/p/jetpack/12.7.1/modules/sso/jetpack-sso-login.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://c0.wp.com/p/jetpack/12.7.1/modules/sso/jetpack-sso-login.js
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A88000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn-cookieyes.com/client_data/a254ee3393878ea4544e8a16/script.js
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060395000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060ECF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.7/umd/popper.min.js
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.00000000609ED000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000609ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://certs.godaddy.com/repository/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046CBE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://certs.godaddy.com/repository/0
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://certs.godaddy.com/repository/F
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://certs.godaddy.com/repository/vv
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cgforge.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cgforge.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cgforge.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004693F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cloudways-static-content.s3.us-east-1.amazonaws.com/error_page/maintenance-domain-mapping.ht
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cms.e.jimdo.com/app/cms/logout.php
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://code.jquery.com/jquery-1.11.2.min.js
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060ECF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://code.jquery.com/jquery-3.6.0.min.js
                          Source: CAC0.exe, 0000000F.00000003.2231870430.00000000463D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cookiedatabase.org/tcf/purposes/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://daniel-wom.de
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://de.wordpress.org/
                          Source: svchost.exe, 00000003.00000003.1364433021.000001DE9BE61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368279659.000001DE9BE62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
                          Source: svchost.exe, 00000003.00000003.1364433021.000001DE9BE61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368205699.000001DE9BE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1366562297.000001DE9BE65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368315765.000001DE9BE81000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364498912.000001DE9BE5D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364584476.000001DE9BE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364614840.000001DE9BE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                          Source: svchost.exe, 00000003.00000002.1368315765.000001DE9BE81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                          Source: svchost.exe, 00000003.00000002.1368297573.000001DE9BE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364414075.000001DE9BE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                          Source: svchost.exe, 00000003.00000003.1364276352.000001DE9BE86000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368334089.000001DE9BE88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                          Source: svchost.exe, 00000003.00000003.1364433021.000001DE9BE61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1366562297.000001DE9BE65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364584476.000001DE9BE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368185082.000001DE9BE3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                          Source: svchost.exe, 00000003.00000002.1368147756.000001DE9BE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368297573.000001DE9BE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364414075.000001DE9BE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                          Source: svchost.exe, 00000003.00000003.1364433021.000001DE9BE61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1366562297.000001DE9BE65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368185082.000001DE9BE3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                          Source: svchost.exe, 00000003.00000002.1368205699.000001DE9BE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364614840.000001DE9BE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                          Source: svchost.exe, 00000003.00000003.1364433021.000001DE9BE61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368279659.000001DE9BE62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://developers.google.com/analytics/devguides/collection/analyticsjs/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dfactory.eu/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/2017/02/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/2017/02/03/hello-world/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/PhpMyAdmin/)
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/PhpMyAdmin/v
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/category/uncategorized/
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/datenschutz/
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/et-cache/global/et-divi-customizer-global-170083034712.mi
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/plugins/cookie-notice/includes/../css/front.min.css?ver=5
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/plugins/cookie-notice/includes/../js/front.min.js?ver=2.0
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/plugins/si-captcha-for-wordpress/captcha/si_captcha.js?ve
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/themes/Divi-child-theme-01/style.css?ver=4.9.4
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/themes/Divi-child-theme-01/style.css?ver=v1.0
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/themes/Divi/core/admin/fonts/modules.ttf
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/themes/Divi/core/admin/js/common.js?ver=4.9.4
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/themes/Divi/images/logo.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/themes/Divi/js/custom.unified.js?ver=4.9.4
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/themes/Divi/js/html5.js
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-content/themes/Divi/style.css?ver=4.9.4
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-includes/css/dashicons.min.css?ver=5.7.10
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-includes/css/dist/block-library/style.min.css?ver=5.7.10
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-includes/js/jquery/jquery.min.js?ver=3.5.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-includes/js/wp-embed.min.js?ver=5.7.10
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-includes/wlwmanifest.xml
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://die-packende-werbung.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/file/d/1IHGdsPH4H3vnnweLuTY15TyThi93jujR/preview?usp=embed_googleplus
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/file/d/1IHGdsPH4H3vnnweLuTY15TyThi93jujR/view?usp=sharing
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/file/d/1IHGdsPH4H3vnnweLuTY15TyThi93jujR/view?usp=sharing/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060367000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/file/d/1IHGdsPH4H3vnnweLuTY15TyThi93jujR/view?usp=sharing/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/file/d/1IHGdsPH4H3vnnweLuTY15TyThi93jujR/view?usp=sharing/administrator/&am
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/file/d/1IHGdsPH4H3vnnweLuTY15TyThi93jujR/view?usp=sharing/phpMyAdmin/&amp;u
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/file/d/1IHGdsPH4H3vnnweLuTY15TyThi93jujR/view?usp=sharing/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/file/d/1IHGdsPH4H3vnnweLuTY15TyThi93jujR/view?usp=sharing/wp-admin/&amp;usp
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/file/d/1IHGdsPH4H3vnnweLuTY15TyThi93jujR/view?usp=sharing/wp-login.php
                          Source: svchost.exe, 00000003.00000003.1364599924.000001DE9BE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368279659.000001DE9BE62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                          Source: svchost.exe, 00000003.00000003.1364614840.000001DE9BE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                          Source: svchost.exe, 00000003.00000003.1364433021.000001DE9BE61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368279659.000001DE9BE62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                          Source: svchost.exe, 00000003.00000002.1368205699.000001DE9BE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364614840.000001DE9BE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
                          Source: svchost.exe, 00000003.00000003.1364614840.000001DE9BE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                          Source: svchost.exe, 00000003.00000002.1368147756.000001DE9BE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368297573.000001DE9BE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364414075.000001DE9BE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C5F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://edv-jupiter.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://edv-jupiter.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://edv-jupiter.de/phpmyadmin/nik.de
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603B8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://edv-jupiter.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://edv-jupiter.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://edv-jupiter.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://edv-jupiter.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ev-stadtmission.de/phpMyAdmin/
                          Source: explorer.exe, 00000002.00000000.1269434269.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://first-class-and-more.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006067000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://first-class-and-more.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://first-class-and-more.de/wp-login.php/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://first-class-and-more.de/wp-login.php/6
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Barlow
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Barlow%7CBarlow
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Google
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Lato%3A1%2C100%2C300%2C400%2C400italic%2C700&#038;ver=4.9.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A3D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D18000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Lato:100
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Lato:400
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Open
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Raleway%3A1%2C100%2C300%2C400%2C400italic%2C700&#038;ver=4.9
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto%3A1%2C100%2C300%2C400%2C400italic%2C700&#038;ver=4.9.
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Source
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/earlyaccess/opensanshebrewcondensed.css?ver=6.3.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com/s/opensans/v34/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTSKmu1aB.woff2)
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.jimstatic.com
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gmpg.org/xfn/11
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004688D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://goettinger-bauelemente.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://goettinger-bauelemente.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000005FBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://hcaptcha.com
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://henkes-lack-union.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://henkes-lack-union.de/datenschutz.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://henkes-lack-union.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://henkes-lack-union.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://hohl-optik.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://holidaypark.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://holidaypark.de/wp-login.phpma/~Sw
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://html5shiv.googlecode.com/svn/trunk/html5.js
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://hu-manity.co/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i.ytimg.com/vi/ID/hqdefault.jpg
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i0.wp.com/wom87.de/wp-content/uploads/2023/04/cropped-Kein-Titel-1200-
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i0.wp.com/wom87.de/wp-content/uploads/2023/11/ein-frhliches-baby-spielt-mit-spielzeug-432164
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i0.wp.com/wom87.de/wp-content/uploads/2023/11/ein-stilvolles-modehaus-mit-internationa-99871
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i0.wp.com/wom87.de/wp-content/uploads/2023/11/eine-apple-watch-der-neuesten-generation-92867
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i0.wp.com/wom87.de/wp-content/uploads/2023/11/gas-station-4978824_1920-1.jpg?resize=390%2C22
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://i0.wp.com/wom87.de/wp-content/uploads/2023/11/peppa-wutz-und-ihre-familie-lachen-34798737.pn
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ib-dahlke.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ib-dahlke.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://image.jimcdn.com
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1c9Jin.img
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/#/schema/logo/image/
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/#organization
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/#website
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/?s=
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/angebot/beratung/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/angebot/freizeit/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/angebot/hilfsmittel-pool/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/angebot/schule/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/angebot/wohnen/unterstuetztes-wohnen-fuer-menschen-mit-koerperlichen-beeintraec
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/angebot/wohnen/unterstuetzung-fuer-menschen-mit-geistiger-behinderung/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/datenschutzerklaerung/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/der-verein/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/der-verein/aktion-guck-ma/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/der-verein/geschichte/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/der-verein/leitbild/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/der-verein/mitglied-werden/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/der-verein/satzung/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/der-verein/spendenkonto/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/kontakt/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/kontakt/anfahrt/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/kontakt/ansprechpartner/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/kontakt/ideen-lob-kritik/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/kontakt/oeffnungszeiten/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/login/dienstjubilaeum/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/login/downloads/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/login/ideen-lob-kritik-intern/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/login/interne-meldestelle/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/login/login-downloads/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/login/schulungsprogramm/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/stellenangebote/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/contact-form-7/includes/js/index.js?ver=5.8.4
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/contact-form-7/includes/swv/js/index.js?ver=5.8.4
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/fruitful-shortcodes/fruitful-shortcodes-1.6.2/includes/short
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/ml-slider/assets/metaslider/public.css?ver=3.50.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/ml-slider/assets/metaslider/script.min.js?ver=3.50.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/ml-slider/assets/sliders/nivoslider/jquery.nivo.slider.pack.
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/ml-slider/assets/sliders/nivoslider/nivo-slider.css?ver=3.50
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/ml-slider/assets/sliders/nivoslider/themes/default/default.c
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/si-captcha-for-wordpress/captcha/si_captcha.js?ver=170316890
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/wp-accessibility/js/a11y.min.js?ver=1.7.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/wp-accessibility/js/longdesc.min.js?ver=1.7.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/wp-accessibility/js/wp-accessibility.min.js?ver=1.7.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/wp-accessibility/js/wpa-toolbar.min.js?ver=1.7.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/zeno-font-resizer/js/jquery.fontsize.js?ver=1.8.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006046E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/plugins/zeno-font-resizer/js/js.cookie.js?ver=1.8.0
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/themes/lavish-pro/favicon.ico
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/themes/lavish-pro/js/lavish-bootstrap.min.js?ver=2.0.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/themes/lavish-pro/js/lavish_extras.js?ver=2.0.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/themes/lavish-pro/js/mytheme-carausel.js?ver=2.0.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/themes/lavish-pro/js/shk_countslider.js?ver=2.0.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/themes/lavish-pro/js/style_portfolio.js?ver=2.0.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/themes/lavish-pro/js/woo_zoom.js?ver=2.0.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/themes/lavish-pro/js/woocommerce-zoom.js?ver=2.0.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/themes/lavish-pro/js/wow.js?ver=2.0.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2016/02/IMG_7209-e1455101250578-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2016/02/cropped-icon-180x180.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2016/02/cropped-icon-192x192.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2016/02/cropped-icon-270x270.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2016/02/cropped-icon-32x32.png
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2016/02/cropped-icon.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2016/02/slide-freizeit-1-1200x450.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2016/02/slide-geschichte-2-1200x450.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2017/02/Klettern-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2018/03/Aktion_Mensch-Das_erste_Mal-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2018/03/Aktion_Mensch-Public_Viewing-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2018/03/INVEMA_Bogenschiessen-640x240.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2018/03/akm_20140417_aufzug_caritas_05.JPG-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/AVM-8-00336_045_Familienratgeber_Lorsch-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/AVM-8-00389_005_Inklusiver_Schwimmkurs_Herne-1200x45
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Barrierefreiheit-und-Mobilitaet-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Bild-2-Stueck-zum-Glueck-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Bildung-und-Persoenlichkeitsstaerkung-994x372.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/DSC_7095-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Familie_Weiss_03-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Foto1-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Inklusives-Ballett-Backnang_Credit_Chris-Cocks-1200x
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Rolli-Sport2-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Rolli-Sport4-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/RollifahrferimWald-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Symbolbild_Assistenzhund-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Symbolbild_Cafe-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Symbolbild_Gewinner4-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/Symbolbild_Internet1-996x373.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/akm_21080705_wissen_leicht_gemacht_04-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/aktion_mensch_130616_db_287-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/spielplatz_duisburg_01-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-content/uploads/2020/09/spielplatz_duisburg_02-1200x450.jpg
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/wp-login.php0
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-ev.de/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-kreuztal.de/wp-content/uploads/2016/02/ISW_Logo_klein.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-kreuztal.de/wp-content/uploads/2016/02/Mitgliedwerden.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-kreuztal.de/wp-content/uploads/2016/02/Spielfiguren2.png);
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-kreuztal.de/wp-content/uploads/2016/02/am_logo-klein.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-kreuztal.de/wp-content/uploads/2016/02/invema-logo_300x71px.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://invema-kreuztal.de/wp-content/uploads/2016/02/spenden.png
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A41000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jgs-service.s6.jgsmedia.de/web/CookieConsentLog/js/jgs_consent_cookie.js
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/aktuelle-arbeiten/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/bauten/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/curriculum-vitae/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/datenschutz/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/kontakt/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/moebelbau-innenraumgestaltung/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/planungen-wettbewerbe/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000602A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/wp-content/uploads/2020/04/Joachim-Schwarzenberg-Architekt-BDA.png
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joachim-schwarzenberg.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jobs.plopsa.com/de?location=Holiday%20Park
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/beratungsangebot/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/datenschutzerklaerung/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/eclipsecon-2020/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/herbstferien-2020/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/java-se-11-zertifiziert/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/jobs/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/portfoliocomfort-offene-beta/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/portfoliocomfort/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/urlaub-oktober/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060418000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-content/plugins/cookie-notice/js/front.min.js?ver=2.4.13
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060418000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-content/themes/omega/js/html5
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-content/uploads/2019/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-content/uploads/2019/01/cropped-android-chrome-512x512-180x180.png
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-content/uploads/2019/01/cropped-android-chrome-512x512-192x192.png
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-content/uploads/2019/01/cropped-android-chrome-512x512-270x270.png
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-content/uploads/2019/01/cropped-android-chrome-512x512-32x32.png
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-content/uploads/2021/09/Siegel.svg
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060418000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060418000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://joerndettmer.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com
                          Source: CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/#logo
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/#organization
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/#richSnippet
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/#webpage
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/#website
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/?s=
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/aktuelles/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/author/designerlang/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/feed/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/heizung/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/kalyta-kundendienst/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/kundendienst/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/lueftungstechnik/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/onlineangebot/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/onlineangebot/heizungsangebot-online/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/onlineangebot/sanitaerangebot-online/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/onlineangebot/solarthermieangebot-online/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/onlineangebot/wartungsvertrag-online/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/regenerative-energie/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wartung/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/e376d8b01f3f6ff454d2bdafd3e3f60a.js?ver=6c9511f2ee56e0b9026cd
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/e376d8b01f3f6ff45x
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/e376d8b01f3f6ff45xo
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/f5a8fb899d4c2e3cf3f139c300d40c80.js?ver=2ccc2f627c37ea15111c2
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/css/37f4b0392b81b4667327702bb2ce687f.css?ver=060ef
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/css/6a2305fd3a20fb774c34a24ace019462.css?ver=2fb94
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/css/6eef40f0e2c01ee9d216c8e51ab835be.css?ver=519bd
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/css/7d3414dae355331c2b06e97d9a2a5e95.css?ver=b240f
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/css/89073ce484fb069841f222be0c2318df.css?ver=00f6e
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/css/c459b4f8d1426da5a080dda4516fd5fd.css?ver=d7241
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/css/cdbb8188db2fe7b2754909fe40100698.css?ver=0f32c
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/css/d27b7139176e1211cc75fa1ef0d0309d.css?ver=f25d8
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/css/e5c90c4e3cf2403b9ba6162f3e361e0f.css?ver=74d0c
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/js/4d2176444b4a1abad44f27a495861851.js?ver=1f443
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/litespeed/js/83ed856308fd3d659162a
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/plugins/happy-elementor-addons-pro/assets/vendor/animate-css/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/plugins/wpforms-lite/assets/css/flatpickr.min.css?ver=2.3.4
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2022/11/kalyta-klempner-bad-sanitaer-heizung.json
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2022/11/kalyta-klempner-bad-sanitaer-kundendienst.jso
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2022/11/kalyta-klempner-bad-sanitaer-lueftung.json
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2022/11/kalyta-klempner-bad-sanitaer-solar.json
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2022/11/kalyta-klempner-bad-sanitaer-wartung.json
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2022/11/kalyta-klempner-bad-sanitaer.json
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/01/Kalyta-k
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/01/Kalyta-klempner-Sanitaer-Heizung-Google-Logo.
                          Source: CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/01/Kalyta-klempner-Sanitaer-Heizung-Logo.jpg
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/09/Kalyta-Klempner-AGB.pdf
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/10/Kalyta-Sanitaer-Heizung-Klempner-Einsatz-1024
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/10/Kalyta-Sanitaer-Heizung-Klempner-Essen1-1024x
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/10/Kalyta-Sanitaer-Heizung-Klempner-Essen2.webp
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/10/Kalyta-Sanitaer-Heizung-Klempner-Feier-1024x6
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/10/Kalyta-Sanitaer-Heizung-Klempner-Feier2-1024x
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/10/Kalyta-Sanitaer-Heizung-Klempner-Inhaber2-102
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/10/Kalyta-Sanitaer-Heizung-Klempner-Stand-1024x6
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/2023/10/Powered-by-Werbeagentur-Lang_w-300x67.webp
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://klempner-kalyta.com/wp-content/uploads/elementor/thumbs/Label_EU_EFRE-pyeg0yexii8eyy34xib9wh
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/PhpMyAdmin/n/hSa
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/anmeldeunterlagen-fuer-die-segelkunstflugwoche/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606E3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006041C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/big-in-japan-where-the-eastern-seas-so-blue/
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606E3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006041C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/datenschutzerklaerung/
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606E3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006041C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/kapverden-mit-der-stemme-ueber-dem-atlantik/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606E3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006041C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/mal-kurz-weg/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606E3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006041C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/namibia/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606E3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006041C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/nepal-aachen-d-knfh/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/phpMyAdmin/pMyAdmin/ee:22F
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/segelkunstflug/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606E3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-content/plugins/strato-assistant/js/cookies.js?ver=1675596669
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-content/themes/twentyten/blocks.css?ver=20230627
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-content/themes/twentyten/style.css?ver=20231107
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-content/uploads/2023/02/cropped-Header-300x84.jpg
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-content/uploads/2023/02/cropped-Header-768x216.jpg
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-content/uploads/2023/02/cropped-Header.jpg
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-includes/css/dist/block-library/style.min.css?ver=6.3.1
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-login.php.dee
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/wp-login.phpaus-helmering.de990
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kunstflieger.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C2D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lavista.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2231870430.00000000463D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/datenschutz/
                          Source: CAC0.exe, 0000000F.00000003.2231870430.00000000463D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/cache/autoptimize/js/autoptimize_single_1f9968a7c7a2a02491393f
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/cache/autoptimize/js/autoptimize_single_55188a5a54889519c62e91
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/cache/autoptimize/js/autoptimize_single_6023fc30c6277adcb667f8
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/cache/autoptimize/js/autoptimize_single_6a0e8318d42803736d2faf
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/cache/autoptimize/js/autoptimize_single_94f028c43ba4c1489e3132
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/cache/autoptimize/js/autoptimize_single_d4991a7742152312e174aa
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/cache/autoptimize/js/autoptimize_single_dc74c9954b1944928eca01
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/cache/autoptimize/js/autoptimize_single_eb782bbebbd0d01bfce4a4
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/cache/autoptimize/js/autoptimize_single_f00345b4d3447b5f5eddb5
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/plugins/complianz-gdpr/cookiebanner/js/complianz.min.js?ver=6.
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/plugins/revslider/public/assets/css/rs6.css?ver=6.6.7
                          Source: CAC0.exe, 0000000F.00000003.2231870430.00000000463D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/themes/aspen/css/aspen-custom.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/themes/aspen/js/utils/bootstrap.min.js?ver=1.0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/themes/aspen/js/utils/jquery.flexslider-min.js?ver=1.0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-content/themes/aspen/js/utils/jquery.stellar.min.js?ver=1.0
                          Source: CAC0.exe, 0000000F.00000003.2231870430.00000000463D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-includes/css/dist/block-library/style.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.14.0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-includes/js/dist/vendor/wp-polyfill-inert.min.js?ver=3.1.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leuchtstoffhaus.de/wp-includes/js/jquery/ui/effect.min.js?ver=1.13.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://loewen-sprudel.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://loewen-sprudel.de/phpmyadmin/istrator/o#
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://majalandwarszawaeu.recreatex.be/Products/Overview
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://manitu.social/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://maps.googleapis.com/maps/api/js?v=3&amp;key=AIzaSyCqaUG-rLmRO3KPacHX2jcTNMeFrekoP4I&amp;ver=
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://maps.googleapis.com/maps/api/js?ver=1.0
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/administrator/?amp=1
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/phpmyadmin/?amp=1
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/phpmyadmin/gnu
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/wp-content/cache/autoptimize/css/autoptimize_single_174c12fa6ad43
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/wp-content/uploads/Logo-300x300.gif
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/wp-content/uploads/Logo.gif
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/wp-includes/js/jquery/jquery.min.js?ver=3.7.0
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://martin-muniz-fotografie.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://maschinenhandel-jung.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605F7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://maxtek.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://maxtek.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mediathek-online.de/
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mediathek-online.de/en/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060319000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C4B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060FA7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mediathek-online.de/zh/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://meet.jit.si/external_api.js?ver=2.2.5
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mfc-potsdam.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mfc-potsdam.de/phpMyAdmin/3E4
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mfc-potsdam.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mfc-potsdam.de/wp-login.phpU
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mfc-potsdam.de/wp-login.phpadmin
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mfc-potsdam.de/wp-login.phpispgateway.de4650=56789P
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://narcotic-music.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/pma/3
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-admin/css/forms.min.css?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-admin/css/l10n.min.css?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-admin/css/login.min.css?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-admin/js/password-strength-meter.min.js?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-admin/js/user-profile.min.js?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-content/plugins/captcha/css/desktop_style.css?ver=4.4.5
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-content/plugins/captcha/css/front_end_style.css?ver=4.4.5
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-content/plugins/captcha/js/front_end_script.js?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/css/buttons.min.css?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/css/dashicons.min.css?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/css/dist/block-library/style.min.css?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/dist/hooks.min.js?ver=c6aec9a8d4e5a5d543a1
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/dist/i18n.min.js?ver=7701b0c3857f914212ef
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.11
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/dist/vendor/wp-polyfill-inert.min.js?ver=3.1.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/jquery/jquery.min.js?ver=3.7.0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/underscore.min.js?ver=1.13.4
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/wp-util.min.js?ver=6.3.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-includes/js/zxcvbn-async.min.js?ver=1.0
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-login.php%
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-login.php?action=lostpassword
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-login.phpJ
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netclue.de/wp-login.phpT
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netcom-systems.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2297950370.00000000606E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netcom-systems.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netcom-systems.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060F74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://netcom-systems.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://notavailable.goneo.deadmin/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ogp.me/ns#
                          Source: CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605C0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605BF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js
                          Source: CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605C0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605BF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://oss.maxcdn.com/respond/1.4.2/respond.min.js
                          Source: explorer.exe, 00000002.00000000.1269434269.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://phpmyadmin02.pauly.de/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://phpmyadmin02.pauly.de/index.php?route=/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://phpmyadmin02.pauly.de/index.php?route=/465
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plopsagroups.be
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plopsaholidaypark.recreatex.be/Membership/Overview?language=de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://polyklima.de/de/phpMyAdmin
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://polyklima.de/de/phpMyAdmini.rwth-aachen.de3
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://polyklima.de/de/wp-admin
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://polyklima.de/de/wp-adminling=
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://polyklima.de/wp-login.php
                          Source: explorer.exe, 00000002.00000000.1269434269.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
                          Source: CAC0.exe, 0000000F.00000003.2296957971.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608C9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://prothe.de/admin
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://prothe.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://prothe.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://prothe.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://prothe.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://prothe.de/wp-login.phpZ
                          Source: CAC0.exe, 0000000F.00000003.1642737458.0000000002A9E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.1633520650.00000000037F0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.1630964680.00000000033D6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.1631193935.0000000003535000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sabotage.net
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schema.org
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schema.org/SiteNavigationElement
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schema.org/WPFooter
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schema.org/WPHeader
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schema.org/WebPage
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schliecker.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schliecker.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schliecker.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schliecker.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2297950370.00000000606EB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BAC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schulze-braak.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2297950370.00000000606EB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BAC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schulze-braak.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schulze-braak.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schulze-braak.de/phpmyadmin/L
                          Source: CAC0.exe, 0000000F.00000003.2297950370.00000000606EB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BAC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schulze-braak.de/wp-content/plugins/delucks-seo
                          Source: CAC0.exe, 0000000F.00000003.2297950370.00000000606EB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BAC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schulze-braak.de/wp-content/plugins/delucks-seo/modules/professional/rating/gutenberg/block-
                          Source: CAC0.exe, 0000000F.00000003.2297950370.00000000606EB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BAC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schulze-braak.de/wp-includes/css/dist/block-library/style.min.css?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2297950370.00000000606EB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BAC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://schulze-braak.de/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.000000006070B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604BD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F84000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468E5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060846000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                          Source: CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com/avatar/937497146137ea495f83baf32a6f74a1?s=96&amp;d=bla
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com/avatar/937497146137ea495f83baf32a6f74a1?s=96&amp;d=blank&amp;r=g
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E4F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sedo.com/search/details/?domain=auditeam-bonn.de&campaignId=329145&origin=sales_lander_15
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://siegel.ausgezeichnet.org/widgets/js/573ab8400cf274f7680009ae/widget/embedded-normal-avgWComm
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://silvercrash.freeprojekt.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://silvercrash.freeprojekt.de/pma/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/#website
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/?s=
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/plugins/wp-rocket/assets/js/lazyload/17.8.3/lazyload.min.js
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/themes/Avada/assets/min/js/general/avada-header.js?ver=7.11.3
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/themes/Avada/assets/min/js/general/avada-menu.js?ver=7.11.3
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/themes/Avada/assets/min/js/general/avada-scrollspy.js?ver=7.11.
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/themes/Avada/assets/min/js/library/bootstrap.scrollspy.js?ver=7
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/uploads/2023/06/sina-spielzeug-gmbh-small.png);
                          Source: CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/uploads/fusion-gfonts/8vI-7wMr0mhh-RQChyHEH06TlXhq_gukbYrFMk1Qu
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/uploads/fusion-icons/icomoon/fonts/icomoon.eot?6qlr6k
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/uploads/fusion-icons/icomoon/fonts/icomoon.eot?6qlr6k#iefix
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/uploads/fusion-icons/icomoon/fonts/icomoon.svg?6qlr6k#icomoon
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/uploads/fusion-icons/icomoon/fonts/icomoon.ttf?6qlr6k
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/uploads/fusion-icons/icomoon/fonts/icomoon.woff?6qlr6k
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sina-spielzeug.de/wp-content/uploads/la_icon_sets/style.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sjh-haustechnik.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sjh-haustechnik.de/phpmyadmin/H
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046971000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://slushpuppie.de
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D0C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sp-ao.shortpixel.ai/client/to_webp
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D46000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://srv7.web-x-pert.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://srv7.web-x-pert.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://srv7.web-x-pert.de/admin.phpxPq
                          Source: CAC0.exe, 0000000F.00000003.2307813481.00000000609FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000609FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://srv7.web-x-pert.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com/docs/common/netcheck.gif
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com/images/branding/product/1x/drive_2020q4_32dp.png
                          Source: CAC0.exe, 0000000F.00000003.2260254406.0000000060ECF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060395000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060ECF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/js/bootstrap.min.js
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stats.wp.com/e-202351.js
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strontium90.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strontium90.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strontium90.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strontium90.de/wp-admin/hp-web.de
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strontium90.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046971000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://studio100.com
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://svane-gmbh.de/phpmyadmin/
                          Source: svchost.exe, 00000003.00000003.1364645985.000001DE9BE30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak
                          Source: svchost.exe, 00000003.00000003.1364645985.000001DE9BE30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virt
                          Source: svchost.exe, 00000003.00000003.1364645985.000001DE9BE30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtuX?
                          Source: svchost.exe, 00000003.00000003.1364614840.000001DE9BE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                          Source: svchost.exe, 00000003.00000003.1364599924.000001DE9BE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364614840.000001DE9BE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                          Source: svchost.exe, 00000003.00000003.1364645985.000001DE9BE30000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364599924.000001DE9BE49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364614840.000001DE9BE41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                          Source: svchost.exe, 00000003.00000002.1368147756.000001DE9BE24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                          Source: svchost.exe, 00000003.00000003.1364645985.000001DE9BE30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.x=
                          Source: svchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://themehall.com
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://themeisle.com/themes/neve/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thomas-ammich.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thomas-ammich.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thomas-ammich.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thomas-ammich.de/wp-admin/gZ
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thomas-ammich.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thomas-ammich.de/wp-login.phpE
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://thomas-ammich.de/wp-login.phpertificateServices.crl
                          Source: svchost.exe, 00000003.00000003.1364433021.000001DE9BE61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368279659.000001DE9BE62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C1D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-admin/css/forms.min.css?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-admin/css/l10n.min.css?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-admin/css/login.min.css?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-admin/js/password-strength-meter.min.js?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-admin/js/user-profile.min.js?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-content/plugins/advanced-nocaptcha-and-invisible-captcha-pro/assets/css/style.
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-content/plugins/limit-login-attempts-reloaded/assets/css/login-page-styles.css
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-content/themes/TiPEDV_1_8_WP/favicon.ico
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-content/themes/TiPEDV_1_8_WP/style.css
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/css/buttons.min.css?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/css/dashicons.min.css?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/css/dist/block-library/style.min.css?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/js/dist/hooks.min.js?ver=c6d64f2cb8f5c6bb49caca37f8828ce3
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/js/dist/i18n.min.js?ver=ebee46757c6a411e38fd079a7ac71d94
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.13.9
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.3.2
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/js/jquery/jquery.min.js?ver=3.6.0
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/js/underscore.min.js?ver=1.13.3
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/js/wp-util.min.js?ver=6.0.6
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-includes/js/zxcvbn-async.min.js?ver=1.0
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-login.php?action=lostpassword
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/wp-login.phpU
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tip-edv.de/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://trade2.domainname.de/?setLang=de
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D34000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D34000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://trkpc.net/track.
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004693F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004688D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://trkpcy.net/track.
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/firstclassmore
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/img/favicon.png?t=1428588862
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/css/font.css?t=1701763469
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/css/layout.css?t=1430319470
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/css/main.css?t=1701763469
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/font/open-sans-cyrillic.woff2?t=1666798625)
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/font/open-sans-greek-ext.woff2?t=1666798704)
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/font/open-sans-greek.woff2?t=1666798811)
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/font/open-sans-hebrew.woff2?t=1666798926)
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/font/open-sans-latin-ext.woff2?t=1666799080)
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/font/open-sans-latin.woff2?t=1666799132)
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/font/open-sans-vietnamese.woff2?t=1666799002
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/font/open-sans.woff2?t=1666797733)
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/img/logo.png?t=1425999216
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/js/jquery-1-9-0-min.js?t=1425946672
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/js/jquery-flexslider-min.js?t=1425946680
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/js/jquery-magnific-popup.js?t=1425946688
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/js/jquery-slicknav-min.js?t=1430318731
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/cms/o/s3e293f085e098e86/userlayout/js/superfish.js?t=1425946732
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://u.jimcdn.com/www70/o/s3e293f085e098e86/img/i1ad46325110b124b/1426166852/std/image.png)
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ulrichmohr.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/PhpMyAdmin/i
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-admin/load-styles.php?c=0&amp;dir=ltr&amp;load%5B%5D=dashicons
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=4.9
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.9.
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/plugins/js_composer/assets/css/vc-ie8.min.css
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/plugins/js_composer/assets/css/vc_lte_ie9.min.css
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/plugins/revslider/public/assets/css/settings.css?ver=5
                          Source: CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/plugins/revslider/public/assets/js/jqu
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/plugins/revslider/public/assets/js/jquery.themepunch.r
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/plugins/revslider/public/assets/js/jquery.themepunch.t
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/assets/animations/animations.min.css?ve
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/assets/animations/animations.min.js?ver
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/assets/jplayer/css/jplayer.blue.monday.
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/assets/jplayer/jplayer.min.js?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/assets/prettyPhoto/prettyPhoto.css?ver=
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/assets/ui/jquery.ui.all.css?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/css/base.css?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/css/layout.css?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/css/responsive.css?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/css/shortcodes.css?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/js/menu.js?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/js/parallax/translate3d.js?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/js/plugins.js?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/js/scripts.js?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-content/themes/betheme/style.css?ver=14.3
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/js/jquery/jquery.js?ver=1.12.4
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/js/jquery/ui/accordion.min.js?ver=1.11.4
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/js/jquery/ui/core.min.js?ver=1.11.4
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/js/jquery/ui/mouse.min.js?ver=1.11.4
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/js/jquery/ui/sortable.min.js?ver=1.11.4
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/js/jquery/ui/tabs.min.js?ver=1.11.4
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/js/jquery/ui/widget.min.js?ver=1.11.4
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/js/wp-embed.min.js?ver=4.9.1
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-includes/wlwmanifest.xml
                          Source: CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006067D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/wp-login.php?action=lostpassword
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unikat-holzverarbeitung.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2297950370.00000000606EB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BAC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://use.fontawesome.com/releases/v5.0.13/css/all.css
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/#primaryimage
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/#webpage
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/#website
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/?s=
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/aventura-catamarans/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/bootsmarkt/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/downloads/
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/feed/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/klimageraete/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/cache/et/16/et-core-unified-17010052806223.min.css
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/plugins/cookie-notice/css/front.min.css?ver=5.3.16
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/plugins/cookie-notice/js/front.min.js?ver=1.2.50
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/plugins/google-analytics-dashboard-for-wp/assets/js/frontend.min
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/plugins/jetpack/css/jetpack.css?ver=8.2.5
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/plugins/the-preloader/js/preloader-script.js
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/themes/Divi/core/admin/js/common.js?ver=3.27.1
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/themes/Divi/js/custom.min.js?ver=3.27.1
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/themes/Divi/style.css?ver=3.27.1
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/uploads/2019/08/Attila_Varga-400x400.jpg
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/uploads/2019/08/Logo_Aventura_Catamarans_RGB_500px.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/uploads/2019/08/MBC_Logo_RGB_500px.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/uploads/2019/08/VargaMarine_Logo-1.svg
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/uploads/2019/08/cropped-VargaMarine_WebIcon_512px-180x180.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/uploads/2019/08/cropped-VargaMarine_WebIcon_512px-192x192.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/uploads/2019/08/cropped-VargaMarine_WebIcon_512px-270x270.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/uploads/2019/08/cropped-VargaMarine_WebIcon_512px-32x32.png
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-content/uploads/2019/09/Signatur_Varga.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-includes/css/dashicons.min.css?ver=5.3.16
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-includes/css/dist/block-library/style.min.css?ver=5.3.16
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-includes/js/jquery/ui/effect.min.js?ver=1.11.4
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-includes/js/wp-embed.min.js?ver=5.3.16
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-includes/wlwmanifest.xml
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fvarga-marine.com%2F
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fvarga-marine.com%2F&#038;format=
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/yachtcharter/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://varga-marine.com/yachtinvest/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vlp-lohne.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vlp-lohne.de/phpmyadmin/L
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vlp-lohne.de/phpmyadmin/n/(?
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://webmail.manitu.de/
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://werbeagentur-lang.com/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wetzel-industrieelektronik.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060432000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wetzel-industrieelektronik.de/admin.php
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000005FA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wiwi.rwth-aachen.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wiwi.rwth-aachen.de/pma/
                          Source: explorer.exe, 00000002.00000000.1266580071.00000000090F2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607DC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000607E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/Lora-VariableFont_wght.ttf
                          Source: CAC0.exe, 0000000F.00000003.2288140248.00000000607E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/Roboto-Light.ttf
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607DC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000607E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/Roboto-Medium.ttf
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/deutschland/wie-kann-eine-tankkarte-ihrem-unternehmen-helfen/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/feed
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/kontakt/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/thema/deutschland/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/thema/satire/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/thema/web/blogging/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/thema/web/google-seo/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/thema/web/webdesign/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/unterhaltung/apple-watch-8-die-neuesten-funktionen-technischen-spezifikationen-und-
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/unterhaltung/jakoo-eine-umfassende-uebersicht-ueber-geschichte-produkte-und-kundenb
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/unterhaltung/peppa-wutz-von-der-entstehung-bis-zum-kulturellen-einfluss-auf-kinder-
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/unterhaltung/peter-hahn-vom-familienunternehmen-zum-internationalen-modehaus-mit-fo
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/wp-admin/n-lai
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/wp-content/plugins/jetpack/css/jetpack.css
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/wp-content/uploads/2023/04/Kein-Titel-1200-
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/wp-login.php?action=jetpack-sso
                          Source: CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/wp-login.php?action=lostpassword
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wom87.de/wp-login.phpp
                          Source: explorer.exe, 00000002.00000000.1269434269.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wordpress.org/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wp.mfc-potsdam.de/wp-content/uploads/2015/04/header31.jpg);
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wp.mfc-potsdam.de/wp-content/uploads/2015/04/header4.jpg);
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060927000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/#website
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/abs-raum-vermietung/#bueros
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/abs-raum-vermietung/#konferenzraum
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/abs-raum-vermietung/#schulungsraum
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/business-software/#mira
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/business-software/#sap-gui
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/sap-beratung/#beratungsservice
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/sap-beratung/#business_intelligence
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/sap-beratung/#entwicklung
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/sap-beratung/#s4hana
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/sap-beratung/#systempflege
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/schulungen/#einfuehrung
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de//leistungen/schulungen/#fortgeschrittene
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/?page_id=250
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060927000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/?s=
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.00000000609FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/administrator/0
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/aktuelles/
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/datenschutz/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/en/
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/karriere/
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/kontakt/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/leistungen/abs-raum-vermietung/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/leistungen/business-software/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/leistungen/sap-beratung/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/leistungen/schulungen/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/leistungen/schulungen/#spezialschulungen
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/phpMyAdmin/e
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/referenzen/
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wir-ueber-uns/unser-leitbild/
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wir-ueber-uns/unser-team/
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wir-ueber-uns/unternehmensgeschichte/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/fontpacks/ionicons/css/ionicons.css?ver=1514913616
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/gravityforms/images/spinner.svg
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/gravityforms/js/gravityforms.min.js?ver=2.6.8
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/gravityforms/js/jquery.json.min.js?ver=2.6.8
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/gravityforms/js/placeholders.jquery.min.js?ver=2.6.8
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/gravityforms/legacy/css/browsers.min.css?ver=2.6.8
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/gravityforms/legacy/css/formreset.min.css?ver=2.6.8
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/gravityforms/legacy/css/formsmain.min.css?ver=2.6.8
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/gravityforms/legacy/css/readyclass.min.css?ver=2.6.8
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/js_composer/assets/lib/bower/isotope/dist/isotope.pkgd.mi
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/menu-icons/css/extra.min.css?ver=0.13.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/menu-icons/vendor/codeinwp/icon-picker/css/types/elusive.
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/menu-icons/vendor/codeinwp/icon-picker/css/types/foundati
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/menu-icons/vendor/codeinwp/icon-picker/css/types/generico
                          Source: CAC0.exe, 0000000F.00000003.2296957971.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/wp-media-folder//asse
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/plugins/wp-media-folder//assets/css/vc_style.css?ver=5.5.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/assets/css/IE7.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/assets/css/IE8.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/assets/css/IE9.css
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/assets/css/root.css?ver=0.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/assets/temp-styles.css?ver=0.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060927000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/favicon.ico
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/css/bootstrap.submenu_hover.css?ve
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/css/jquery.tosrus.all.css?ver=6.4.
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/fastclick.js?ver=0.1.9
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/jquery.ba-throttle-debounce.js?
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/jquery.cookiebar.js?ver=0.1.9
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/jquery.textfill.js?ver=0.6.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/jquery.tosrus.min.all.js?ver=1.
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/modernizr.js?ver=0.
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/modernizr.js?ver=0.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/modernizr.load.js?ver=0.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/slick.js?ver=1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/js/wow.js?ver=1.1.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/framework/lib/bootstrap/dist/js/bootstrap.js
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/js/blog.js?ver=0.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/js/devmode.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/js/imagesloaded.pkgd.js?ver=0.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/js/jquery.waypoints.min.js?ver=0.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/js/layout_high_priority.js?ver=0.0.1
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/js/main.js?ver=0.1
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/footer/extensions/adress_sidemap/c
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/footer/extensions/adress_sidemap/m
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/footer/extensions/cta/css/main.css
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/footer/extensions/cta/main.js?ver=
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/footer/templates/standard/css/main
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/header/extensions/login/css/main.c
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/header/extensions/login/main.js?ve
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/header/extensions/search/css/main.
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/header/extensions/search/main.js?v
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/header/mobilemenu/standard/css/mai
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/header/mobilemenu/standard/main.js
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/header/templates/docked/css/main.c
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/templates/header/templates/docked/main.js?ve
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/themes/360vier-theme/vc_custom/assets/js/vc_frontend_scripts.js?v
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/uploads/cropped-favicon_512x512-1-180x180.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/uploads/cropped-favicon_512x512-1-192x192.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/uploads/cropped-favicon_512x512-1-270x270.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-content/uploads/cropped-favicon_512x512-1-32x32.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/css/dashicons.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/css/dist/block-library/style.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/js/dist/a11y.min.js?ver=7032343a947cfccf5608
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/js/dist/dom-ready.min.js?ver=392bdd43726760d1f3ca
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/js/dist/hooks.min.js?ver=c6aec9a8d4e5a5d543a1
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/js/dist/i18n.min.js?ver=7701b0c3857f914212ef
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.14.0
                          Source: CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/js/dist/vendor/wp-polyfill-inert.min.js?ver=3.1.2
                          Source: CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.000000000601E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.abs-gmbh.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ausgezeichnet.org
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/#website
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/?s=
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/administrator/min.php
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/agb/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/aktuelles-2/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/cookie-policy/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/datenschutzerklaerung-mev/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/datenschutzerklaerung/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/fahrzeuge/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/fahrzeuge/gebrauchtwagen/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/fahrzeuge/inzahlungnahme/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/fahrzeuge/neuwagen/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/fahrzeuge/tageszulassungen/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/modelle/fiat-modelle/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/modelle/suzuki-modelle/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/rechtliche-hinweise/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/services/pkw-service/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/services/servicetermin-anfrage/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/services/transporter-service/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/services/wohnmobil-service/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/specials/dhl-paketshop/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/specials/scheibenreparatur/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/specials/unfallschadenservice/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/unternehmen/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/unternehmen/jobs/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/unternehmen/team/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/cookie-law-info/legacy/public/css/cookie-law-in
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/cookie-law-info/legacy/public/js/cookie-law-inf
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/cpo-companion/assets/css/fontawesome.css?ver=6.
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/cpo-companion/assets/css/style.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/mobilede_wordpress/css/bootstrap.min.css?ver=6.
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/mobilede_wordpress/css/slick-theme.min.css?ver=
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/mobilede_wordpress/css/slick.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/mobilede_wordpress/css/style_16.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/mobilede_wordpress/js/slick-init.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/plugins/mobilede_wordpress/js/slick.min.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/themes/allegiant/core/css/base.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060617000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/themes/allegiant/core/scripts/core.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/themes/allegiant/core/scripts/html5-min.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060617000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/themes/allegiant/core/scripts/jquery.CPOscroll.js?ver=6
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/themes/allegiant/style.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/themes/allegiant_child/style.css?ver=4
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/themes/allegiant_child/style.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2019/09/MG_4879-1.jpg
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2019/09/helmering-logo.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2019/10/fiat-qubo.jpg);
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/MOVERA-Logo-Screen-1024x389.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/MOVERA-Logo-Screen-1536x584.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/MOVERA-Logo-Screen-228x87.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/MOVERA-Logo-Screen-300x114.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/MOVERA-Logo-Screen-768x292.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/MOVERA-Logo-Screen.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/goldschmitt-logo_1200-1024x305.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/goldschmitt-logo_1200-228x68.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/goldschmitt-logo_1200-300x90.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/goldschmitt-logo_1200-768x229.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/03/goldschmitt-logo_1200.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Fiat_Logo-116x116.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Fiat_Logo-150x150.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Fiat_Logo-300x300.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Fiat_Logo.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Fiat_Professional_Logo-116x116.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Fiat_Professional_Logo-150x150.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Fiat_Professional_Logo-300x300.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Fiat_Professional_Logo.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Helmering_Logo-116x116.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Helmering_Logo-150x150.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Helmering_Logo-300x300.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Helmering_Logo.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Suzuki_Logo-174x116.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Suzuki_Logo-300x200.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Suzuki_Logo-600x400.png
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-content/uploads/2022/12/Suzuki_Logo.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-includes/css/dist/block-library/style.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autohaus-helmering.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/administrator?cookie-state-change=
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/datenschutz/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/fahrzeuge/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/kontakt/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/service-auto-ankauf/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/service-finanzierung/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/service/
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/unternehmen/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-admin/Status
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-content/uploads/2020/06/b1automobile-redlogo-lg.png
                          Source: CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-content/uploads/2020/06/b1automobile-redlogo-xs.png
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-content/uploads/2020/11/cropped-favicon-180x180.png
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-content/uploads/2020/11/cropped-favicon-192x192.png
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-content/uploads/2020/11/cropped-favicon-270x270.png
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-content/uploads/2020/11/cropped-favicon-32x32.png
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-content/uploads/omgf/redux-google-fonts-salient_redux/redux-google-f
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.b1-automobile.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bafa.de/DE/Energie/Energieeffizienzwegweiser/energieeffizienzwegweiser.html
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bee2bee.be/DE
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046971000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bellheimer.de
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/datenschutzerklaerung/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-admin/css/forms.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-admin/css/l10n.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-admin/css/login.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-admin/js/password-strength-meter.min.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-admin/js/user-profile.min.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-content/uploads/2020/07/cropped-Logo_regits-1-180x180.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-content/uploads/2020/07/cropped-Logo_regits-1-192x192.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-content/uploads/2020/07/cropped-Logo_regits-1-270x270.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-content/uploads/2020/07/cropped-Logo_regits-1-32x32.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.00000000469E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-content/uploads/2021/01/BeSt-Com-Logo-2c_neu2021.jpg
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/css/buttons.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/css/dashicons.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/dist/hooks.min.js?ver=c6aec9a8d4e5a5d543a1
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/dist/i18n.min.js?ver=7701b0c3857f914212ef
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.14.0
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/dist/vendor/wp-polyfill-inert.min.js?ver=3.1.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/underscore.min.js?ver=1.13.4
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/wp-util.min.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-includes/js/zxcvbn-async.min.js?ver=1.0
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060441000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bestcom.de/wp-login.php?action=lostpassword
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046971000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bielenprodukten.be
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A39000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.boergel.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.boergel.de/PhpMyAdmin/0
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006034D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D8D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.boergel.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.boergel.de/admin.php.de3X
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.boergel.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.boldgrid.com/w3-total-cache/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.branchenkompass-frankfurt.de/branchenbuch/brinco%C2%AE-computer-service-gmbh-frankfurt-d
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.branchenkompass-wiesbaden.de/images/linkus/button-empfehlung-beige-300.png
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006043A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bs-mietpark.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2292944068.00000000606B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bs-mietpark.de/admin.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bs-mietpark.de/admin.phphead
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bs-mietpark.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bs-mietpark.de/wp-admin/hp
                          Source: CAC0.exe, 0000000F.00000003.2292944068.0000000060654000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.buecker-kunststoffe.de/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046971000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cocacolaep.com/de/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046971000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.combell.com
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046971000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.combell.com/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.credly.com
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060617000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dat.de/uploads/media/LeitfadenCO2.pdf
                          Source: CAC0.exe, 0000000F.00000003.2292296836.000000006072B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605AC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046968000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D46000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E44000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D46000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1582433677.0000017F52EA6000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580805602.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580667276.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1588979196.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp, D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000605AC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPSE
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPSHL
                          Source: CAC0.exe, 0000000F.00000003.2292296836.000000006072B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPSe
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPSu
                          Source: CAC0.exe, 0000000F.00000003.2292296836.000000006072B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPSudel.de
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.domainname.de/domain/clickon.de
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004684F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.domainname.de/domain/intensivmedicus.de
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D74000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.drupal.org)
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.enerpremium.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.enerpremium.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.enerpremium.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.enerpremium.de/not-found/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ACD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.enerpremium.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.enerpremium.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.enerpremium.de/wp-admin/0/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.enerpremium.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046B94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.enerpremium.de/wp-login.phpJ
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/aktiv-kreativ/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/datenschutzerklaerung/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/finanzierung/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/gemeindeleben/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/gottesdienste/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/kids-teens/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/kleingruppen/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/kontakt-2/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/schaukasten/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/terminkalender/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/ueber-uns/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-admin/css/forms.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-admin/css/l10n.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-admin/css/login.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-admin/js/password-strength-meter.min.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/plugins/eventon-lite/assets/js/lib/handlebars.js?ver=2.2.5
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/plugins/eventon-lite/assets/js/lib/moment.min.js?ver=2.2.5
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/plugins/getwid/assets/css/blocks.style.css?ver=2.0.3
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/plugins/getwid/assets/js/frontend.blocks.js?ver=2.0.3
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/plugins/getwid/vendors/fancybox/jquery.fancybox.min.css?ve
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/plugins/getwid/vendors/fontawesome-free/css/all.min.css?ve
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/plugins/getwid/vendors/slick/slick/slick-theme.min.css?ver
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/plugins/getwid/vendors/slick/slick/slick.min.css?ver=1.9.0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/plugins/wpfront-scroll-top/js/wpfront-scroll-top.min.js?ve
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/themes/neve/assets/js/build/modern/frontend.js?ver=3.7.4
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A2A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/themes/neve/style-main-new.min.css?ver=3.7.4
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/uploads/2020/05/cropped-stadtmission-logo-2011-180x180.png
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/uploads/2020/05/cropped-stadtmission-logo-2011-192x192.png
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/uploads/2020/05/cropped-stadtmission-logo-2011-270x270.png
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/uploads/2020/05/cropped-stadtmission-logo-2011-32x32.png
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/uploads/2020/05/stadtmission-logo-2011-300x50.png
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-content/uploads/2020/05/stadtmission-logo-2011.png
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/css/buttons.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/css/dashicons.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/css/dist/block-library/style.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/js/dist/hooks.min.js?ver=c6aec9a8d4e5a5d543a1
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/js/dist/i18n.min.js?ver=7701b0c3857f914212ef
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/js/dist/vendor/regenerator-runtime.min.js?ver=0.14.0
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/js/dist/vendor/wp-polyfill-inert.min.js?ver=3.1.2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=3.15.0
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-includes/js/zxcvbn-async.min.js?ver=1.0
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/wp-login.php?action=lostpassword
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ev-stadtmission.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.exactmetrics.com/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.flugplatzmuseumcottbus.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.flugplatzmuseumcottbus.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.flugplatzmuseumcottbus.de/wp-login.phprator/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.galabau-mg.de/phpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.galabau-mg.de/phpMyAdmin/n-boote.de
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com
                          Source: CAC0.exe, 0000000F.00000003.2288140248.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BF8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F2E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060816000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BF8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/api.js?hl=de
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/api.js?hl=de_DE&amp;onload=recaptchaCallback&amp;render=explicit&am
                          Source: CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/api.js?onload=c4wp_onloadCallback&#038;render=explicit&#038;hl=de-D
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006035F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/api.js?render=6Ldrj0gjAAAAAF9cbfseqFk8kFup-GoHTKls5Jkn&amp;ver=3.0
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610D1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A41000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A41000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=G-8CECESZLK3
                          Source: CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=UA-1822085-2
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=UA-264114145-1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A41000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtm.js?id=
                          Source: CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/_/apps-fileview/_/js/k=apps-fileview.v.en.O9C7SlJhAvQ.O/am=AAM/d=1/rs=AO0039
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/_/apps-fileview/_/ss/k=apps-fileview.v.PBAQJE20Tws.L.F4.O/am=AAM/d=0/rs=AO00
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046971000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.heinz.be
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A41000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.henkes-lack-union.de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A41000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.henkes-lack-union.de/download.php?pdf=agb.pdf
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A41000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hlu-farben.de
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060ECF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060ECE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/administrator/index.php
                          Source: CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/de/#/convious
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/de/geschenkbox-die-idee-fuer-weihnachten-0
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/de/seite-nicht-gefunden
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D74000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/en/page-not-found
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D74000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/fr/page-non-trouvee
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D74000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/nl/pagina-niet-gevonden
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046D74000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C14000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263897941.0000000060D16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046C14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/phpmyadmin/schwarzenberg.de
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D74000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/Holiday%20Park.jpg
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/holiday-park.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/logo-majaland-kownaty.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/majaland-warsaw.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/plopsa-coo.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/plopsa-hotel.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/plopsa-indoor-coevorden.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/plopsa-indoor-hasselt.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/plopsa-station-antwerp_1.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/plopsa-village.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/plopsaland-de-panne.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/plopsaqua-de-panne.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/plopsaqua-landen-hannuit.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/sites/default/files/public/brand/logos/proximus-theater.png
                          Source: CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D74000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.holidaypark.de/strona-nie-zostala-znaleziona
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hostblogger.de/blog/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/abwasser/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/administrator/3
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/arbeitssicherheit/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/baustellenueberwachung/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/datenschutzerklaerung/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/fremdueberwachung-alt/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/in-eigener-sache/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/kanalsanierung/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/kooperationen/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/mitgliedschaften/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/niederlassung-dueren/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/projektsteuerung/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/sachverstaendigenwesen/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/verkehr/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wasser/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-admin/admin-ajax.php
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/plugins/cookie-notice/css/front.min.css?ver=4.6.27
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/plugins/cookie-notice/js/front.min.js?ver=1.2.43
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold-child/style.css?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/audio-playe
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/blog/blog.c
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/buttonrow/b
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/buttons/but
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/buttons_ful
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/catalogue/c
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/comments/co
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/contact/con
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/contentslid
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/countdown/c
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/gallery/gal
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/gallery_hor
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/google_maps
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/grid_row/gr
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/heading/hea
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/headline_ro
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/hr/hr.css?v
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/icon/icon.c
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/iconbox/ico
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/icongrid/ic
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/iconlist/ic
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/image/image
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/image_hotsp
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/magazine/ma
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/masonry_ent
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/menu/menu.c
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/menu/menu.j
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/notificatio
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/numbers/num
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/portfolio/i
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/portfolio/p
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/post_metada
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/postslider/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/progressbar
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/promobox/pr
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/search/sear
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/slideshow/s
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/slideshow_a
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/slideshow_f
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/slideshow_l
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/social_shar
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/tab_section
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/table/table
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/tabs/tabs.c
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/tabs/tabs.j
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/team/team.c
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/testimonial
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/timeline/ti
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/toggles/tog
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/video/video
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-template-builder/asset
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/css/avia-snippet-lightbox.css?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/css/avia-snippet-site-preloader.css?ver=4.6.27
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/css/avia-snippet-widget.css?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/css/base.css?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/css/custom.css?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/css/grid.css?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/css/layout.css?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/css/shortcodes.css?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/framework/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/framework/js/conditional_load/avia_google_maps_fro
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/avia-compat.js?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/avia-snippet-lightbox.js?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/avia-snippet-megamenu.js?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/avia-snippet-sidebarmenu.js?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/avia-snippet-widget.js?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/avia.js?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/aviapopup/jquery.magnific-popup.min.js?ver=4.7.
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/aviapopup/magnific-popup.css?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/html5shiv.js
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/themes/enfold/js/shortcodes.js?ver=4.7.6.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/uploads/2016/11/favicon.ico
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/uploads/2016/12/Logo_Dirk_Dahlke_Ingenieur_340_2.png
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-content/uploads/dynamic_avia/enfold_child.css?ver=636b8e0134578
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-includes/js/jquery/jquery.js?ver=1.12.4
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-includes/js/wp-embed.min.js?ver=4.6.27
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-includes/wlwmanifest.xml
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046AB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/wp-login.php?redirect_to=https%3A%2F%2Fwww.ib-dahlke.de%2Fwp-admin%2F&reaut
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ib-dahlke.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.instagram.com/firstclassandmore/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.instagram.com/holiday_park_official/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046C5B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ispconfig.org
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609CD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000609CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.joomla.org
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kfw.de/inlandsfoerderung/Privatpersonen/Bestandsimmobilien/?kfwmc=VT.Servicebutton.EES.V
                          Source: CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.kfw.de/inlandsfoerderung/Privatpersonen/Bestandsimmobilien/Energetische-Sanierung/?kfwmc
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.linkedin.com/company/first-class-and-more/
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/
                          Source: CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/H
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/agb/
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/datenschutz/
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/haendler/
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/impressum/
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/kontakt/
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/lieferservice/
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/mineralien/
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/sortiment/
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/umwelt/
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/unternehmen/
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/werksverkauf/
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-admin/localhostlLg
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/assets/images/obernauer-loewensprudel.
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/assets/jquery-3.3.1.min.js?ver=3.3.1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/modules/content-slider/swiper.min.css?
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/modules/content-slider/swiper.min.js?v
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/modules/scripts.js?ver=20065474620
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/modules/styles.css?ver=23152470699
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/script.js?ver=1652776368
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/style.css?ver=1557492681
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/arm.svg
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/cropped-favicon-180x180.png
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/cropped-favicon-192x192.png
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/cropped-favicon-270x270.png
                          Source: CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/cropped-favicon-32x32.png
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/flasche.svg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/frontansicht-1024x258.jpg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/frontansicht-300x76.jpg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/frontansicht-768x194.jpg
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/frontansicht.jpg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/glas.svg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/kv-1024x488.jpg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/kv-300x143.jpg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/kv-768x366.jpg
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/kv.jpg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/obernau-panorama-1024x258.jpg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/obernau-panorama-300x76.jpg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604B6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/obernau-panorama-768x194.jpg
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-content/uploads/2018/11/obernau-panorama.jpg
                          Source: CAC0.exe, 0000000F.00000003.2297950370.000000006068F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060351000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-includes/js/wp-embed.min.js?ver=4.9.24
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-includes/wlwmanifest.xml
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.loewen-sprudel.de%2F
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.loewen-sprudel.de%2F&#0
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.loewen-sprudel.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.majalandkownaty.pl
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.majalandkownaty.pl/de/#convious
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.majalandwarsaw.pl
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.manitu.de/
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.manitu.de/fehler/404/
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.manitu.de/phpmyadmin/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/administrator/Dv
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/container-service/
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/vermietung/
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/vermietung/bodenverdichter/
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/vermietung/kettenbagger/
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/vermietung/minibagger-kompaktbagger/
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/vermietung/mobilbagger/
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/vermietung/radlader/
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/vermietung/stromgeneratoren/
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/vermietung/teleskoplader/
                          Source: CAC0.exe, 0000000F.00000003.2267526328.00000000609BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/vermietung/transportfahrzeu5S
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/wp-content/plugins/ga-germanized/assets/js/cookieconsent.js?ver=
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/wp-content/plugins/ga-germanized/assets/js/gaoptout.js?ver=1.6.2
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/wp-content/plugins/wpcf7-recaptcha/assets/js/wpcf7-recaptcha-con
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/wp-content/themes/kallyas/addons/slick/slick.min.js?ver=4.18.1
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/wp-content/themes/kallyas/addons/smooth_scroll/SmoothScroll.min.
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/wp-content/themes/kallyas/framework/zion-builder/dist/znpb_front
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/wp-content/themes/kallyas/pagebuilder/elements/google_map/assets
                          Source: CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.maschinenhandel-jung.de/wp-content/uploads/2018/10/map-marker-maschinenhandel-jung.png
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mbc-marine.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/datenschutz/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/kontakt/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/leistungen/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/marktplatz/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/onlineshops/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/preisliste/
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wertgarantie/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-admin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-admin/load-scripts.php?c=0&amp;load%5B%5D=jquery-core
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-admin/load-styles.php?c=0&amp;dir=ltr&amp;load%5B%5D=dashicons
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-co
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/plugins/cookie-notice/css/front.min.css?ver=4.9.24
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/plugins/cookie-notice/js/front.min.js?ver=1.2.42
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/themes/Divi/epanel/shortcodes/css/shortcodes.css?ver=3.0
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/themes/Divi/epanel/shortcodes/css/shortcodes_responsive.css?ve
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/themes/Divi/js/html5.js
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/themes/Divi/js/jquery.fitvids.js?ver=4.9.24
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/themes/Divi/js/jquery.magnific-popup.js?ver=4.9.
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/themes/Divi/js/waypoints.min.js?ver=4.9.24
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/themes/Divi/style.css?ver=4.9.24
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-content/uploads/2015/04/logo_hell-300x300.png
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
                          Source: CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-includes/js/jquery/jquery.js?ver=1.12.4
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-includes/wlwmanifest.xml
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/wp-login.php?action=lostpassword
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/xmlrpc.php
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060E8B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mfc-potsdam.de/xmlrpc.php?rsd
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.monsterinsights.com/
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
                          Source: CAC0.exe, 0000000F.00000003.2255778739.00000000607CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mydomaincontact.com/index.php?domain_name=csiny.de
                          Source: CAC0.exe, 0000000F.00000003.2255457153.000000004693F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046B0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D34000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D34000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607AB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004688D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mydomaincontact.com/index.php?domain_name=ebz-mtk.de
                          Source: D89C.exe, 00000010.00000003.1585159831.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.openssl.org/H
                          Source: CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.picture.srcset
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pinterest.com/firstclassmore/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsabee2bee.com
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsacoo.be
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsacoo.be/de/#/convious
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsafuncard.be/de
                          Source: CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsahotel.be
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsaindoorcoevorden.nl
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsaindoorcoevorden.nl/de#/convious
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsaindoorhasselt.be
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsaindoorhasselt.be/de/#/convious
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsajobs.be/de
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsalanddepanne.be
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsalanddepanne.be/de/#/convious
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsanews.com/de/parken/holiday-park
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsaquadepanne.be
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsaquadepanne.be/de/#/convious
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsaquahannutlanden.be/de/#/convious
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsaqualandenhannuit.be
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsaschools.be/de
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsastationantwerp.be
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsastationantwerp.be/de/#/convious
                          Source: CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.plopsavillage.be
                          Source: explorer.exe, 00000002.00000000.1264685341.00000000071A4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.pollensense.com/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A0B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.proximustheater.be
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ratgeber-frankfurt.de/computersicherheit-fuer-unternehmen-frankfurt.html
                          Source: CAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605C0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061018000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605BF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rodenstock.de/de/de/big-exact.html
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046971000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C76000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.0000000046927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rombouts.com
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604CD000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.000000004684F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rwth-aachen.de
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.salessurvey.de/Image/4/w250/brinco1
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.0000000061099000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060429000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.00000000469FB000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2267526328.0000000060928000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060621000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060339000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.salessurvey.de/Seller/brinco1/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004684F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sedo.com/services/parking.php3
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D5F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060640000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.strato.de
                          Source: CAC0.exe, 0000000F.00000003.2272244499.0000000046D5F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060640000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.strato.de/
                          Source: CAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/
                          Source: CAC0.exe, 0000000F.00000003.2277407606.000000006034D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A39000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.wrocklage.de/internetagentur/
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.xing.com/img/buttons/5_de_btn.gif
                          Source: CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.xing.com/profile/Joern_Dettmer2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060F3B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060927000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610A1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BEC000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060476000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060927000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yoast.com/wordpress/plugins/seo/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/#aura-soma
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/#kontakt
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/#reiki
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/#team
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/#yoga
                          Source: CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/PhpMyAdmin/
                          Source: CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/administrator/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/comments/feed/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/feed/
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A88000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-admin/admin-ajax.php
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/fonts/oswald/Oswald-Regular.ttf
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/fonts/ovo/Ovo-Regular.ttf
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/fonts/roboto-condensed/RobotoCondensed-Regular.ttf
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/fonts/roboto-mono/RobotoMono-Regular.ttf
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/fonts/roboto/Roboto-Regular.ttf
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/plugins/fresh-framework///framework/extern/iconfonts/ff-font-awesome4
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/plugins/fresh-framework///framework/extern/iconfonts/ff-font-brandico
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/plugins/fresh-framework///framework/extern/iconfonts/ff-font-et-line/
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/plugins/fresh-framework///framework/extern/iconfonts/ff-font-iconic/f
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/plugins/fresh-framework///framework/extern/iconfonts/ff-font-simple-l
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/plugins/fresh-framework//framework/frslib/src/frslib.js?ver=1.63.0
                          Source: CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/plugins/fresh-framework//framework/themes/builder/metaBoxThemeBuilder
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060BD3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/bootstrap/css/bootstrap.min.css?ver=3.3.7
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/bootstrap/js/bootstrap.min.js?ver=3.3.7
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/cubeportfolio/css/cubeportfolio.min.css?ver
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/html5shiv.js?ver=3.7.3
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/j
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/jquery.animsition.min.js?ver=4.0.1
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/jquery.back-to-top.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/jquery.imagesloaded.pkgd.min.js?ver=3.2.0
                          Source: CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/jquery.touchSwipe.min.js?
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/jquery.touchSwipe.min.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/j~
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/magnific-popup/jquery.magnific-popup.min.js
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/magnific-popup/magnific-popup.css?ver=1.1.0
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/owl-carousel/assets/owl.carousel.css?ver=1.
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/owl-carousel/owl.carousel.min.js?ver=1.3.2
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/respond.min.js?ver=1.1.0
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/scrollbar/jquery.mCustomScrollbar.concat.mi
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/scrollbar/jquery.mCustomScrollbar.css?ver=3
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/plugins/twentytwenty/css/twentytwenty.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/scripts/app.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/animsition.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/auto-hiding-navbar.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/form-modal.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/header-sticky.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/magnific-popup.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/owl-carousel.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/scrollbar.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/wow.js?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/builder/placeholders/logo-default.png
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/themes/ark/style.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/css/colors.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_114x114--2020_07_07__
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_120x120--2020_07_07__
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_144x144--2020_07_07__
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_152x152--2020_07_07__
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_160x160--2020_07_07__
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_16x16--2020_07_07__11
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_196x196--2020_07_07__
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_32x32--2020_07_07__11
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_57x57--2020_07_07__11
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_60x60--2020_07_07__11
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_72x72--2020_07_07__11
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_76x76--2020_07_07__11
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_96x96--2020_07_07__11
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/icon2020_07_07__11_31_59.ico
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.0000000060673000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.0000000060673000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-includes/css/dist/block-library/style.min.css?ver=6.4.2
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
                          Source: CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-includes/js/jquery/ui/effect.min.js?ver=1.13.2
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-json/
                          Source: CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-login.php
                          Source: CAC0.exe, 0000000F.00000003.2277407606.00000000604DE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000604DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/wp-login.phpde
                          Source: CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yogajoye.de/xmlrpc.php?rsd

                          Key, Mouse, Clipboard, Microphone and Screen Capturing

                          barindex
                          Source: Yara matchFile source: 0.3.27i42a6Qag.exe.24a0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.27i42a6Qag.exe.ab0e67.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 13.2.atjdeae.9d0e67.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.2.F280.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.3.F280.exe.af0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 13.2.atjdeae.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.27i42a6Qag.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 13.3.atjdeae.9e0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.2.F280.exe.990e67.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000D.00000003.1464709517.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000002.1709725092.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000D.00000002.1516321517.0000000000A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1283124377.00000000024C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1211760629.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000D.00000002.1515885415.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1653752830.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1283076802.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

                          E-Banking Fraud

                          barindex
                          Source: Yara matchFile source: 24.2.2BD.exe.400000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.2.2BD.exe.2ea0e67.15.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.3.2BD.exe.3790000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000018.00000003.1710868011.0000000003BD2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3811903783.0000000000843000.00000040.00000001.01000000.0000001C.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3832224383.00000000032E3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                          System Summary

                          barindex
                          Source: 17.0.E212.exe.920000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
                          Source: 00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                          Source: 00000000.00000002.1282976357.0000000000AD9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                          Source: 00000014.00000002.1709868553.0000000000B18000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                          Source: 00000014.00000002.1709725092.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                          Source: 0000000D.00000002.1516321517.0000000000A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                          Source: 00000018.00000002.3832224383.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                          Source: 00000014.00000002.1709564637.0000000000990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                          Source: 00000015.00000002.1682638655.0000000005600000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                          Source: 00000000.00000002.1282861339.0000000000AB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                          Source: 0000000E.00000002.1562660242.00000000051A4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                          Source: 00000018.00000002.3830617319.0000000002A9F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                          Source: 00000000.00000002.1283124377.00000000024C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                          Source: 0000000D.00000002.1515807475.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                          Source: 0000000D.00000002.1515885415.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                          Source: 0000000D.00000002.1516424096.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                          Source: 0000001D.00000002.1771997732.0000000005600000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                          Source: 00000000.00000002.1283076802.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                          Source: C:\Users\user\AppData\Local\Temp\E212.exe, type: DROPPEDMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
                          Source: E212.exe.2.drStatic PE information: section name:
                          Source: is-41K4U.tmp.38.drStatic PE information: section name:
                          Source: is-41K4U.tmp.38.drStatic PE information: section name:
                          Source: is-S2I8K.tmp.38.drStatic PE information: section name:
                          Source: is-S2I8K.tmp.38.drStatic PE information: section name:
                          Source: is-I133A.tmp.38.drStatic PE information: section name:
                          Source: is-I133A.tmp.38.drStatic PE information: section name:
                          Source: is-RB2I0.tmp.38.drStatic PE information: section name:
                          Source: is-S509N.tmp.38.drStatic PE information: section name:
                          Source: is-S509N.tmp.38.drStatic PE information: section name:
                          Source: is-E4V7I.tmp.38.drStatic PE information: section name:
                          Source: is-E4V7I.tmp.38.drStatic PE information: section name:
                          Source: is-JBL11.tmp.38.drStatic PE information: section name:
                          Source: is-8RHLH.tmp.38.drStatic PE information: section name:
                          Source: is-8RHLH.tmp.38.drStatic PE information: section name:
                          Source: is-8RHLH.tmp.38.drStatic PE information: section name:
                          Source: is-MGN69.tmp.38.drStatic PE information: section name:
                          Source: is-MGN69.tmp.38.drStatic PE information: section name:
                          Source: is-A9ADB.tmp.38.drStatic PE information: section name:
                          Source: is-A9ADB.tmp.38.drStatic PE information: section name:
                          Source: is-A9ADB.tmp.38.drStatic PE information: section name:
                          Source: is-P98GR.tmp.38.drStatic PE information: section name:
                          Source: is-P98GR.tmp.38.drStatic PE information: section name:
                          Source: is-39T3N.tmp.38.drStatic PE information: section name:
                          Source: is-39T3N.tmp.38.drStatic PE information: section name:
                          Source: is-3R28B.tmp.38.drStatic PE information: section name:
                          Source: is-3R28B.tmp.38.drStatic PE information: section name:
                          Source: is-3R28B.tmp.38.drStatic PE information: section name:
                          Source: is-N4QUM.tmp.38.drStatic PE information: section name:
                          Source: is-N4QUM.tmp.38.drStatic PE information: section name:
                          Source: is-3NL81.tmp.38.drStatic PE information: section name:
                          Source: is-3NL81.tmp.38.drStatic PE information: section name:
                          Source: is-3NL81.tmp.38.drStatic PE information: section name:
                          Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess Stats: CPU usage > 49%
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00401590 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401590
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_004015CB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015CB
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00403383 LdrLoadDll,RtlZeroMemory,GetModuleHandleA,NtQueryKey,NtEnumerateKey,0_2_00403383
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_0040159B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040159B
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_004015B0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015B0
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_004015BC NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015BC
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_00401590 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_00401590
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_004015CB NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004015CB
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_0040159B NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_0040159B
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_004015B0 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004015B0
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_004015BC NtDuplicateObject,NtCreateSection,NtMapViewOfSection,LocalAlloc,NtMapViewOfSection,VirtualProtect,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,13_2_004015BC
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_05360110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,14_2_05360110
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00401459 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,20_2_00401459
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00401464 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,20_2_00401464
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00401476 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,20_2_00401476
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00403208 NtTerminateProcess,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,20_2_00403208
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_0040320A NtTerminateProcess,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,20_2_0040320A
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00403233 NtTerminateProcess,LdrLoadDll,RtlInitUnicodeString,RtlZeroMemory,GetModuleHandleA,NtMapViewOfSection,NtAllocateVirtualMemory,NtDuplicateObject,NtQuerySystemInformation,NtQueryInformationProcess,NtOpenKey,NtQueryKey,NtEnumerateKey,RtlCreateUserThread,strstr,wcsstr,tolower,towlower,20_2_00403233
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_004031E8 NtTerminateProcess,LdrLoadDll,RtlZeroMemory,GetModuleHandleA,20_2_004031E8
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_004021E9 NtQuerySystemInformation,20_2_004021E9
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00401487 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,20_2_00401487
                          Source: C:\ProgramData\Drivers\csrss.exeCode function: 21_2_05800110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,21_2_05800110
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D5D9C16_2_00007FF7285D5D9C
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D4E5016_2_00007FF7285D4E50
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285B67A016_2_00007FF7285B67A0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D31FC16_2_00007FF7285D31FC
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D09E416_2_00007FF7285D09E4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C11F016_2_00007FF7285C11F0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C09D016_2_00007FF7285C09D0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285CFA3816_2_00007FF7285CFA38
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285B1B9016_2_00007FF7285B1B90
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C13F416_2_00007FF7285C13F4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C8BD016_2_00007FF7285C8BD0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C0BD416_2_00007FF7285C0BD4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D8B9816_2_00007FF7285D8B98
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285CCC3416_2_00007FF7285CCC34
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C2C3416_2_00007FF7285C2C34
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C659016_2_00007FF7285C6590
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285CFA3816_2_00007FF7285CFA38
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D2D6016_2_00007FF7285D2D60
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C0DE016_2_00007FF7285C0DE0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C1EA016_2_00007FF7285C1EA0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C4F8016_2_00007FF7285C4F80
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C674416_2_00007FF7285C6744
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285CD74816_2_00007FF7285CD748
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C0FE416_2_00007FF7285C0FE4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C6FC816_2_00007FF7285C6FC8
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C674416_2_00007FF7285C6744
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D585016_2_00007FF7285D5850
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C283016_2_00007FF7285C2830
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285B80D016_2_00007FF7285B80D0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D50CC16_2_00007FF7285D50CC
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285CD0C816_2_00007FF7285CD0C8
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeCode function: 17_2_01A8D42417_2_01A8D424
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0040100018_2_00401000
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0040123018_2_00401230
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0040798818_2_00407988
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0061705018_2_00617050
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0061800018_2_00618000
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0063E8FD18_2_0063E8FD
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005F70E018_2_005F70E0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_006140B018_2_006140B0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005F38A018_2_005F38A0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0061296018_2_00612960
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0061213018_2_00612130
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005E693018_2_005E6930
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_006161F018_2_006161F0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005E49C018_2_005E49C0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062A98018_2_0062A980
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005F69A018_2_005F69A0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0061826018_2_00618260
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062C26018_2_0062C260
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00639A6B18_2_00639A6B
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005F2A4018_2_005F2A40
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062CA4018_2_0062CA40
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062BA5018_2_0062BA50
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00610AC018_2_00610AC0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_006302D018_2_006302D0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005E32A018_2_005E32A0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005E73F018_2_005E73F0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0063AB9318_2_0063AB93
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0064BC5718_2_0064BC57
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062B4E018_2_0062B4E0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0060F4F018_2_0060F4F0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_006134A018_2_006134A0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00613C9018_2_00613C90
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062FD6018_2_0062FD60
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005F354018_2_005F3540
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005F6D1018_2_005F6D10
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0064BD0F18_2_0064BD0F
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062CDF018_2_0062CDF0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_006315F018_2_006315F0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005E567018_2_005E5670
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00600E5018_2_00600E50
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062D65018_2_0062D650
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0062AE3018_2_0062AE30
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0064EE0C18_2_0064EE0C
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00631E8018_2_00631E80
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0061577018_2_00615770
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00649F5E18_2_00649F5E
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0063070018_2_00630700
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_006147C018_2_006147C0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00634FC018_2_00634FC0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_006197D018_2_006197D0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0063DF9018_2_0063DF90
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285D5D9C22_2_00007FF7285D5D9C
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285D31FC22_2_00007FF7285D31FC
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285D09E422_2_00007FF7285D09E4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285C11F022_2_00007FF7285C11F0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285C09D022_2_00007FF7285C09D0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285CFA3822_2_00007FF7285CFA38
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285B1B9022_2_00007FF7285B1B90
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285C13F422_2_00007FF7285C13F4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285C8BD022_2_00007FF7285C8BD0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285C0BD422_2_00007FF7285C0BD4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285D8B9822_2_00007FF7285D8B98
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285CCC3422_2_00007FF7285CCC34
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285C2C3422_2_00007FF7285C2C34
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285C659022_2_00007FF7285C6590
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285CFA3822_2_00007FF7285CFA38
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285D2D6022_2_00007FF7285D2D60
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285C0DE022_2_00007FF7285C0DE0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4443022_2_00007FFB0BA44430
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA41F7822_2_00007FFB0BA41F78
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4672B22_2_00007FFB0BA4672B
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4105F22_2_00007FFB0BA4105F
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4521322_2_00007FFB0BA45213
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BB766A022_2_00007FFB0BB766A0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA419DD22_2_00007FFB0BA419DD
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA41EB522_2_00007FFB0BA41EB5
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA41AE622_2_00007FFB0BA41AE6
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA44E8A22_2_00007FFB0BA44E8A
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BBDE57022_2_00007FFB0BBDE570
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BB2251022_2_00007FFB0BB22510
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA41B9A22_2_00007FFB0BA41B9A
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4386922_2_00007FFB0BA43869
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BBF3BE022_2_00007FFB0BBF3BE0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BB7FB4022_2_00007FFB0BB7FB40
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BBDBAD022_2_00007FFB0BBDBAD0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA43C2422_2_00007FFB0BA43C24
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4250922_2_00007FFB0BA42509
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BAAFA0022_2_00007FFB0BAAFA00
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BC7797022_2_00007FFB0BC77970
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA42C5722_2_00007FFB0BA42C57
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4380F22_2_00007FFB0BA4380F
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA5BF2022_2_00007FFB0BA5BF20
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BB6BF3022_2_00007FFB0BB6BF30
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4514B22_2_00007FFB0BA4514B
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4135C22_2_00007FFB0BA4135C
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA471A822_2_00007FFB0BA471A8
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA42BF822_2_00007FFB0BA42BF8
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA5BD6022_2_00007FFB0BA5BD60
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4201322_2_00007FFB0BA42013
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4283322_2_00007FFB0BA42833
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA41B7722_2_00007FFB0BA41B77
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4188E22_2_00007FFB0BA4188E
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4466022_2_00007FFB0BA44660
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA5F20022_2_00007FFB0BA5F200
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA4251822_2_00007FFB0BA42518
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA448DB22_2_00007FFB0BA448DB
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BBDB15022_2_00007FFB0BBDB150
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA6B85022_2_00007FFB0BA6B850
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BFAA8C022_2_00007FFB0BFAA8C0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BFEA1A022_2_00007FFB0BFEA1A0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BFF8D3022_2_00007FFB0BFF8D30
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF9FD6022_2_00007FFB0BF9FD60
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF6DDA022_2_00007FFB0BF6DDA0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF6BE9022_2_00007FFB0BF6BE90
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF23E9022_2_00007FFB0BF23E90
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF7A8C022_2_00007FFB0BF7A8C0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF1395D22_2_00007FFB0BF1395D
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF1397722_2_00007FFB0BF13977
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BFF09F022_2_00007FFB0BFF09F0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BFC8A0022_2_00007FFB0BFC8A00
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0C010A2022_2_00007FFB0C010A20
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF6AA4022_2_00007FFB0BF6AA40
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF11AC022_2_00007FFB0BF11AC0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF2CB2022_2_00007FFB0BF2CB20
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF99BA022_2_00007FFB0BF99BA0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BF6DBB022_2_00007FFB0BF6DBB0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB226A39D022_2_00007FFB226A39D0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB23A3204022_2_00007FFB23A32040
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB23A66E0422_2_00007FFB23A66E04
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: String function: 00635F00 appears 35 times
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: String function: 00007FF7285B2770 appears 73 times
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: String function: 00007FFB0BA45DEE appears 160 times
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: String function: 00007FFB0BA41C0D appears 35 times
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: String function: 00007FFB0BA41055 appears 352 times
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: String function: 00007FFB0BFE7370 appears 383 times
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: String function: 00007FFB0BA44697 appears 55 times
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: String function: 00007FFB0BFFE7E0 appears 43 times
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: String function: 00007FFB0BA44106 appears 82 times
                          Source: 153C.exe.2.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                          Source: 153C.tmp.25.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                          Source: 153C.tmp.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                          Source: 153C.tmp.25.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                          Source: 153C.tmp.25.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                          Source: 153C.tmp.33.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                          Source: 153C.tmp.33.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                          Source: 153C.tmp.33.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                          Source: 153C.tmp.33.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                          Source: is-JCIME.tmp.38.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                          Source: is-JCIME.tmp.38.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                          Source: is-JCIME.tmp.38.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                          Source: is-JCIME.tmp.38.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                          Source: is-SCE6L.tmp.38.drStatic PE information: Number of sections : 11 > 10
                          Source: is-J4IUM.tmp.38.drStatic PE information: Number of sections : 18 > 10
                          Source: is-MF4KB.tmp.38.drStatic PE information: Number of sections : 11 > 10
                          Source: is-8GNBU.tmp.38.drStatic PE information: Number of sections : 11 > 10
                          Source: 27i42a6Qag.exe, 00000000.00000002.1282713741.0000000000848000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLariants> vs 27i42a6Qag.exe
                          Source: C:\Windows\explorer.exeSection loaded: wscinterop.dllJump to behavior
                          Source: C:\Windows\explorer.exeSection loaded: wscapi.dllJump to behavior
                          Source: C:\Windows\explorer.exeSection loaded: werconcpl.dllJump to behavior
                          Source: C:\Windows\explorer.exeSection loaded: framedynos.dllJump to behavior
                          Source: C:\Windows\explorer.exeSection loaded: hcproviders.dllJump to behavior
                          Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dllJump to behavior
                          Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: csunsapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: swift.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: nfhwcrhk.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: surewarehook.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: csunsapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: aep.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: atasi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: swift.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: nfhwcrhk.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: nuronssl.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: surewarehook.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: ubsec.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: aep.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: atasi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: swift.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: nfhwcrhk.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: nuronssl.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: surewarehook.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeSection loaded: ubsec.dllJump to behavior
                          Source: C:\ProgramData\Drivers\csrss.exeSection loaded: csunsapi.dll
                          Source: C:\ProgramData\Drivers\csrss.exeSection loaded: swift.dll
                          Source: C:\ProgramData\Drivers\csrss.exeSection loaded: nfhwcrhk.dll
                          Source: C:\ProgramData\Drivers\csrss.exeSection loaded: surewarehook.dll
                          Source: C:\ProgramData\Drivers\csrss.exeSection loaded: csunsapi.dll
                          Source: C:\ProgramData\Drivers\csrss.exeSection loaded: swift.dll
                          Source: C:\ProgramData\Drivers\csrss.exeSection loaded: nfhwcrhk.dll
                          Source: C:\ProgramData\Drivers\csrss.exeSection loaded: surewarehook.dll
                          Source: 27i42a6Qag.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: 17.0.E212.exe.920000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
                          Source: 00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                          Source: 00000000.00000002.1282976357.0000000000AD9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                          Source: 00000014.00000002.1709868553.0000000000B18000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                          Source: 00000014.00000002.1709725092.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                          Source: 0000000D.00000002.1516321517.0000000000A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                          Source: 00000018.00000002.3832224383.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                          Source: 00000014.00000002.1709564637.0000000000990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                          Source: 00000015.00000002.1682638655.0000000005600000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                          Source: 00000000.00000002.1282861339.0000000000AB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                          Source: 0000000E.00000002.1562660242.00000000051A4000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                          Source: 00000018.00000002.3830617319.0000000002A9F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                          Source: 00000000.00000002.1283124377.00000000024C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                          Source: 0000000D.00000002.1515807475.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                          Source: 0000000D.00000002.1515885415.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                          Source: 0000000D.00000002.1516424096.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                          Source: 0000001D.00000002.1771997732.0000000005600000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                          Source: 00000000.00000002.1283076802.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                          Source: C:\Users\user\AppData\Local\Temp\E212.exe, type: DROPPEDMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
                          Source: 27i42a6Qag.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: F280.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: atjdeae.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: jvjdeae.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: rbuttontray.exe.38.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: _RegDLL.tmp.38.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: 2635.dll.2.drStatic PE information: Section: .rdata ZLIB complexity 0.998779296875
                          Source: 2635.dll.2.drStatic PE information: Section: .code ZLIB complexity 0.9976908898478403
                          Source: E212.exe.2.drStatic PE information: Section: ZLIB complexity 0.9998024635800402
                          Source: is-41K4U.tmp.38.drStatic PE information: Section: ZLIB complexity 0.9964533211297071
                          Source: is-E4V7I.tmp.38.drStatic PE information: Section: ZLIB complexity 0.9976058467741935
                          Source: is-8RHLH.tmp.38.drStatic PE information: Section: ZLIB complexity 0.995148689516129
                          Source: is-MGN69.tmp.38.drStatic PE information: Section: ZLIB complexity 0.9908203125
                          Source: is-39T3N.tmp.38.drStatic PE information: Section: ZLIB complexity 0.9903624487704918
                          Source: is-3R28B.tmp.38.drStatic PE information: Section: ZLIB complexity 0.9891526442307692
                          Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@63/1085@0/100
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285B74E0 GetLastError,FormatMessageW,WideCharToMultiByte,16_2_00007FF7285B74E0
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AE004D CreateToolhelp32Snapshot,Module32First,0_2_00AE004D
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\atjdeaeJump to behavior
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4836:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1304:120:WilError_03
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user~1\AppData\Local\Temp\CAC0.tmpJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exeJump to behavior
                          Source: 27i42a6Qag.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_Processor
                          Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization
                          Source: 27i42a6Qag.exeReversingLabs: Detection: 32%
                          Source: 27i42a6Qag.exeVirustotal: Detection: 47%
                          Source: D89C.exeString found in binary or memory: -startline must be less than or equal to -endline
                          Source: D89C.exeString found in binary or memory: -help
                          Source: D89C.exeString found in binary or memory: can't send non-None value to a just-started coroutine
                          Source: D89C.exeString found in binary or memory: can't send non-None value to a just-started generator
                          Source: D89C.exeString found in binary or memory: can't send non-None value to a just-started async generator
                          Source: D89C.exeString found in binary or memory: --help
                          Source: D89C.exeString found in binary or memory: --help
                          Source: unknownProcess created: C:\Users\user\Desktop\27i42a6Qag.exe C:\Users\user\Desktop\27i42a6Qag.exe
                          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                          Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
                          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                          Source: unknownProcess created: C:\Users\user\AppData\Roaming\atjdeae C:\Users\user\AppData\Roaming\atjdeae
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\CAC0.exe C:\Users\user~1\AppData\Local\Temp\CAC0.exe
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess created: C:\Users\user\AppData\Local\Temp\CAC0.exe C:\Users\user~1\AppData\Local\Temp\CAC0.exe
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\D89C.exe C:\Users\user~1\AppData\Local\Temp\D89C.exe
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\E212.exe C:\Users\user~1\AppData\Local\Temp\E212.exe
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\E753.exe C:\Users\user~1\AppData\Local\Temp\E753.exe
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F280.exe C:\Users\user~1\AppData\Local\Temp\F280.exe
                          Source: C:\Windows\explorer.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess created: C:\Users\user\AppData\Local\Temp\D89C.exe C:\Users\user~1\AppData\Local\Temp\D89C.exe
                          Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\2BD.exe C:\Users\user~1\AppData\Local\Temp\2BD.exe
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\153C.exe C:\Users\user~1\AppData\Local\Temp\153C.exe
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess created: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmp "C:\Users\user~1\AppData\Local\Temp\is-SE9SP.tmp\153C.tmp" /SL5="$70050,7161388,54272,C:\Users\user~1\AppData\Local\Temp\153C.exe"
                          Source: C:\Windows\explorer.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\Sysnative\cmd.exe /C fodhelper
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32 /s C:\Users\user~1\AppData\Local\Temp\2635.dll
                          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe /s C:\Users\user~1\AppData\Local\Temp\2635.dll
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess created: C:\Users\user\AppData\Local\Temp\153C.exe "C:\Users\user\AppData\Local\Temp\153C.exe" /SPAWNWND=$203E6 /NOTIFYWND=$70050
                          Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess created: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp "C:\Users\user~1\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp" /SL5="$303F6,7161388,54272,C:\Users\user\AppData\Local\Temp\153C.exe" /SPAWNWND=$203E6 /NOTIFYWND=$70050
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\CAC0.exe C:\Users\user~1\AppData\Local\Temp\CAC0.exeJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\D89C.exe C:\Users\user~1\AppData\Local\Temp\D89C.exeJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\E212.exe C:\Users\user~1\AppData\Local\Temp\E212.exeJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\E753.exe C:\Users\user~1\AppData\Local\Temp\E753.exeJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F280.exe C:\Users\user~1\AppData\Local\Temp\F280.exeJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe" Jump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\2BD.exe C:\Users\user~1\AppData\Local\Temp\2BD.exeJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\153C.exe C:\Users\user~1\AppData\Local\Temp\153C.exeJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe" Jump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32 /s C:\Users\user~1\AppData\Local\Temp\2635.dllJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exeJump to behavior
                          Source: C:\Windows\System32\svchost.exeProcess created: unknown unknownJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess created: C:\Users\user\AppData\Local\Temp\CAC0.exe C:\Users\user~1\AppData\Local\Temp\CAC0.exeJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess created: C:\Users\user\AppData\Local\Temp\D89C.exe C:\Users\user~1\AppData\Local\Temp\D89C.exe
                          Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\Sysnative\cmd.exe /C fodhelper
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess created: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmp "C:\Users\user~1\AppData\Local\Temp\is-SE9SP.tmp\153C.tmp" /SL5="$70050,7161388,54272,C:\Users\user~1\AppData\Local\Temp\153C.exe"
                          Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
                          Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe /s C:\Users\user~1\AppData\Local\Temp\2635.dll
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess created: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp "C:\Users\user~1\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp" /SL5="$303F6,7161388,54272,C:\Users\user\AppData\Local\Temp\153C.exe" /SPAWNWND=$203E6 /NOTIFYWND=$70050
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess created: unknown unknown
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess created: unknown unknown
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess created: unknown unknown
                          Source: C:\Windows\System32\fodhelper.exeProcess created: unknown unknown
                          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpWindow found: window name: TMainForm
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                          Source: 27i42a6Qag.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                          Source: Binary string: C:\rogajehanovo\vezaviku\xoyi.pdb source: 27i42a6Qag.exe, 00000000.00000002.1282558748.0000000000423000.00000002.00000001.01000000.00000003.sdmp, 27i42a6Qag.exe, 00000000.00000000.1205590236.0000000000423000.00000002.00000001.01000000.00000003.sdmp, atjdeae, 0000000D.00000002.1515576830.0000000000423000.00000002.00000001.01000000.00000005.sdmp, atjdeae, 0000000D.00000000.1458585616.0000000000423000.00000002.00000001.01000000.00000005.sdmp
                          Source: Binary string: C:\A\18\s\PCbuild\amd64\select.pdb source: D89C.exe, 00000010.00000003.1587146603.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: C:\A\18\s\PCbuild\amd64\_tkinter.pdb source: D89C.exe, 00000010.00000003.1581078457.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: !C:\rogajehanovo\vezaviku\xoyi.pdb source: 27i42a6Qag.exe, 00000000.00000002.1282558748.0000000000423000.00000002.00000001.01000000.00000003.sdmp, 27i42a6Qag.exe, 00000000.00000000.1205590236.0000000000423000.00000002.00000001.01000000.00000003.sdmp, atjdeae, 0000000D.00000002.1515576830.0000000000423000.00000002.00000001.01000000.00000005.sdmp, atjdeae, 0000000D.00000000.1458585616.0000000000423000.00000002.00000001.01000000.00000005.sdmp
                          Source: Binary string: C:\A\18\s\PCbuild\amd64\_bz2.pdb source: D89C.exe, 00000010.00000003.1579936286.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: C:\A\18\s\PCbuild\amd64\_hashlib.pdb source: D89C.exe, 00000010.00000003.1580540209.0000017F52E9D000.00000004.00000020.00020000.00000000.sdmp

                          Data Obfuscation

                          barindex
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeUnpacked PE file: 0.2.27i42a6Qag.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                          Source: C:\Users\user\AppData\Roaming\atjdeaeUnpacked PE file: 13.2.atjdeae.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeUnpacked PE file: 17.2.E212.exe.920000.0.unpack .text:ER; :R;.reloc:R;.idata:W;.rsrc:R;.themida:EW;.boot:ER; vs .text:ER; :R;.reloc:R;
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeUnpacked PE file: 20.2.F280.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeUnpacked PE file: 24.2.2BD.exe.400000.5.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.idata:W;.reloc:R;.symtab:R;
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeUnpacked PE file: 24.2.2BD.exe.400000.5.unpack
                          Source: E212.exe.2.drStatic PE information: 0xAEF8BC98 [Tue Jan 9 02:53:12 2063 UTC]
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00401450 VirtualAlloc,LoadLibraryA,GetProcAddress,GetProcAddress,VirtualProtect,lstrlenW,CreateThread,Sleep,WaitForSingleObject,18_2_00401450
                          Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
                          Source: rbuttontray.exe.38.drStatic PE information: real checksum: 0x0 should be: 0x2fee06
                          Source: is-3R28B.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0xb5c3
                          Source: is-SELVI.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x22a56
                          Source: is-8RHLH.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x5060
                          Source: is-P98GR.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x17d41
                          Source: is-2AO2J.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x1f2f4
                          Source: is-3NL81.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0xadc6
                          Source: is-RUS1B.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0xf050f
                          Source: is-JCIME.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0xb3a65
                          Source: is-N4QUM.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0xcf45
                          Source: is-41K4U.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x1fec7
                          Source: is-A9ADB.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x127ab
                          Source: is-I133A.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x6b1f
                          Source: is-E4V7I.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x10609
                          Source: is-JNKL5.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x4ac84
                          Source: is-BI9RT.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x31782
                          Source: 2BD.exe.2.drStatic PE information: real checksum: 0x426aee should be: 0x4263c3
                          Source: 153C.tmp.25.drStatic PE information: real checksum: 0x0 should be: 0xb0a52
                          Source: _setup64.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x8546
                          Source: _RegDLL.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0xc2b7
                          Source: is-MGN69.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x204aa
                          Source: E753.exe.2.drStatic PE information: real checksum: 0x0 should be: 0x950f2
                          Source: is-39T3N.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0xc979
                          Source: is-S2I8K.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x2e339
                          Source: _isdecmp.dll.38.drStatic PE information: real checksum: 0x0 should be: 0x5528
                          Source: is-S8DR3.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x346e7
                          Source: is-8GNBU.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0xc1c38
                          Source: is-S509N.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x7c1a
                          Source: 153C.exe.2.drStatic PE information: real checksum: 0x0 should be: 0x71732b
                          Source: 153C.tmp.33.drStatic PE information: real checksum: 0x0 should be: 0xb0a52
                          Source: is-9EEN2.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x5dc2c
                          Source: is-5D0J9.tmp.38.drStatic PE information: real checksum: 0x0 should be: 0x60b0b
                          Source: _iscrypt.dll.38.drStatic PE information: real checksum: 0x0 should be: 0x89d2
                          Source: 2635.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x240c10
                          Source: 2635.dll.2.drStatic PE information: section name: .code
                          Source: E753.exe.2.drStatic PE information: section name: .frAQB
                          Source: D89C.exe.2.drStatic PE information: section name: _RDATA
                          Source: E212.exe.2.drStatic PE information: section name:
                          Source: E212.exe.2.drStatic PE information: section name: .themida
                          Source: E212.exe.2.drStatic PE information: section name: .boot
                          Source: VCRUNTIME140.dll.16.drStatic PE information: section name: _RDATA
                          Source: libcrypto-1_1.dll.16.drStatic PE information: section name: .00cfg
                          Source: libssl-1_1.dll.16.drStatic PE information: section name: .00cfg
                          Source: rbuttontray.exe.38.drStatic PE information: section name: .art
                          Source: is-J4IUM.tmp.38.drStatic PE information: section name: /4
                          Source: is-J4IUM.tmp.38.drStatic PE information: section name: /19
                          Source: is-J4IUM.tmp.38.drStatic PE information: section name: /31
                          Source: is-J4IUM.tmp.38.drStatic PE information: section name: /45
                          Source: is-J4IUM.tmp.38.drStatic PE information: section name: /57
                          Source: is-J4IUM.tmp.38.drStatic PE information: section name: /70
                          Source: is-J4IUM.tmp.38.drStatic PE information: section name: /81
                          Source: is-J4IUM.tmp.38.drStatic PE information: section name: /92
                          Source: is-AQMS9.tmp.38.drStatic PE information: section name: /4
                          Source: is-APCUM.tmp.38.drStatic PE information: section name: /4
                          Source: is-9PABP.tmp.38.drStatic PE information: section name: /4
                          Source: is-VA2MS.tmp.38.drStatic PE information: section name: /4
                          Source: is-RUS1B.tmp.38.drStatic PE information: section name: .trace
                          Source: is-RUS1B.tmp.38.drStatic PE information: section name: _RDATA
                          Source: is-RUS1B.tmp.38.drStatic PE information: section name: .debug_o
                          Source: is-8GNBU.tmp.38.drStatic PE information: section name: .didata
                          Source: is-9EEN2.tmp.38.drStatic PE information: section name: .sxdata
                          Source: is-FSKC9.tmp.38.drStatic PE information: section name: /4
                          Source: is-EM1PF.tmp.38.drStatic PE information: section name: /4
                          Source: is-B5B8O.tmp.38.drStatic PE information: section name: /4
                          Source: is-SCE6L.tmp.38.drStatic PE information: section name: /4
                          Source: is-41K4U.tmp.38.drStatic PE information: section name:
                          Source: is-41K4U.tmp.38.drStatic PE information: section name:
                          Source: is-41K4U.tmp.38.drStatic PE information: section name: petite
                          Source: is-S2I8K.tmp.38.drStatic PE information: section name:
                          Source: is-S2I8K.tmp.38.drStatic PE information: section name:
                          Source: is-S2I8K.tmp.38.drStatic PE information: section name: petite
                          Source: is-I133A.tmp.38.drStatic PE information: section name:
                          Source: is-I133A.tmp.38.drStatic PE information: section name:
                          Source: is-I133A.tmp.38.drStatic PE information: section name: petite
                          Source: is-RB2I0.tmp.38.drStatic PE information: section name:
                          Source: is-RB2I0.tmp.38.drStatic PE information: section name: petite
                          Source: is-S509N.tmp.38.drStatic PE information: section name:
                          Source: is-S509N.tmp.38.drStatic PE information: section name:
                          Source: is-S509N.tmp.38.drStatic PE information: section name: petite
                          Source: is-E4V7I.tmp.38.drStatic PE information: section name:
                          Source: is-E4V7I.tmp.38.drStatic PE information: section name:
                          Source: is-E4V7I.tmp.38.drStatic PE information: section name: petite
                          Source: is-JBL11.tmp.38.drStatic PE information: section name:
                          Source: is-JBL11.tmp.38.drStatic PE information: section name: petite
                          Source: is-8RHLH.tmp.38.drStatic PE information: section name:
                          Source: is-8RHLH.tmp.38.drStatic PE information: section name:
                          Source: is-8RHLH.tmp.38.drStatic PE information: section name:
                          Source: is-MGN69.tmp.38.drStatic PE information: section name:
                          Source: is-MGN69.tmp.38.drStatic PE information: section name:
                          Source: is-MGN69.tmp.38.drStatic PE information: section name: petite
                          Source: is-A9ADB.tmp.38.drStatic PE information: section name:
                          Source: is-A9ADB.tmp.38.drStatic PE information: section name:
                          Source: is-A9ADB.tmp.38.drStatic PE information: section name:
                          Source: is-P98GR.tmp.38.drStatic PE information: section name:
                          Source: is-P98GR.tmp.38.drStatic PE information: section name:
                          Source: is-P98GR.tmp.38.drStatic PE information: section name: petite
                          Source: is-39T3N.tmp.38.drStatic PE information: section name:
                          Source: is-39T3N.tmp.38.drStatic PE information: section name:
                          Source: is-39T3N.tmp.38.drStatic PE information: section name: petite
                          Source: is-3R28B.tmp.38.drStatic PE information: section name:
                          Source: is-3R28B.tmp.38.drStatic PE information: section name:
                          Source: is-3R28B.tmp.38.drStatic PE information: section name:
                          Source: is-N4QUM.tmp.38.drStatic PE information: section name:
                          Source: is-N4QUM.tmp.38.drStatic PE information: section name:
                          Source: is-N4QUM.tmp.38.drStatic PE information: section name: petite
                          Source: is-O87JD.tmp.38.drStatic PE information: section name: /4
                          Source: is-DD71M.tmp.38.drStatic PE information: section name: /4
                          Source: is-MF4KB.tmp.38.drStatic PE information: section name: /4
                          Source: is-0CFF9.tmp.38.drStatic PE information: section name: /4
                          Source: is-3NL81.tmp.38.drStatic PE information: section name:
                          Source: is-3NL81.tmp.38.drStatic PE information: section name:
                          Source: is-3NL81.tmp.38.drStatic PE information: section name:
                          Source: is-4NREN.tmp.38.drStatic PE information: section name: /4
                          Source: is-VB4M3.tmp.38.drStatic PE information: section name: .eh_fram
                          Source: is-JNKL5.tmp.38.drStatic PE information: section name: asmcode
                          Source: is-6KLJM.tmp.38.drStatic PE information: section name: .eh_fram
                          Source: is-E9NSK.tmp.38.drStatic PE information: section name: /4
                          Source: is-JUUQK.tmp.38.drStatic PE information: section name: /4
                          Source: is-DTJ6P.tmp.38.drStatic PE information: section name: /4
                          Source: is-FRPIR.tmp.38.drStatic PE information: section name: /4
                          Source: is-U33RE.tmp.38.drStatic PE information: section name: /4
                          Source: is-MDJ3J.tmp.38.drStatic PE information: section name: /4
                          Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32 /s C:\Users\user~1\AppData\Local\Temp\2635.dll
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_004014A1 push es; iretd 0_2_004014A3
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_004022A8 pushfd ; ret 0_2_004022C7
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AB230F pushfd ; ret 0_2_00AB232E
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AB1506 push es; iretd 0_2_00AB150A
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AE1A8B pushfd ; ret 0_2_00AE1B6A
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AE7B93 push cs; iretd 0_2_00AE7B95
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AE42F2 push ss; iretd 0_2_00AE42F8
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AE1466 push 8A1E29FAh; iretd 0_2_00AE146B
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AE0F50 push es; iretd 0_2_00AE0F70
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_004014A1 push es; iretd 13_2_004014A3
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_004022A8 pushfd ; ret 13_2_004022C7
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_009D230F pushfd ; ret 13_2_009D232E
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_009D1506 push es; iretd 13_2_009D150A
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_00AD7C8B push cs; iretd 13_2_00AD7C8D
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_00AD1B83 pushfd ; ret 13_2_00AD1C62
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_00AD43EA push ss; iretd 13_2_00AD43F0
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_00AD1048 push es; iretd 13_2_00AD1068
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_00AD155E push 8A1E29FAh; iretd 13_2_00AD1563
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_052B670A pushad ; ret 14_2_052B670C
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_0531C80A push 5A36841Dh; retf 14_2_0531C825
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_053544BD push cs; ret 14_2_053544BE
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_05331FA2 push es; retn 0075h14_2_05331FB0
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_052622EF push ebx; iretd 14_2_052622F7
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_053547F8 push edx; retf 14_2_053547F9
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_0531C7ED push ebp; retf 14_2_0531C7EE
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00403520 push eax; ret 18_2_00403535
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00405571 push ecx; ret 18_2_00405584
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_006491CD push ecx; ret 18_2_006491CC
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005E42E0 push eax; mov dword ptr [esp], 00000000h18_2_005E42E2
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00401965 push 00000021h; iretd 20_2_0040196D
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00401EE5 push ebx; iretd 20_2_00401EED
                          Source: initial sampleStatic PE information: section name: .text entropy: 7.402660917481356
                          Source: initial sampleStatic PE information: section name: .text entropy: 7.406936175108796
                          Source: initial sampleStatic PE information: section name: .boot entropy: 7.952996187021671
                          Source: initial sampleStatic PE information: section name: .text entropy: 7.402660917481356
                          Source: initial sampleStatic PE information: section name: .text entropy: 7.406936175108796
                          Source: initial sampleStatic PE information: section name: .text entropy: 7.644314334306342
                          Source: initial sampleStatic PE information: section name: entropy: 7.953893773659523
                          Source: initial sampleStatic PE information: section name: entropy: 7.921519965168042
                          Source: initial sampleStatic PE information: section name: entropy: 7.966771808365004
                          Source: initial sampleStatic PE information: section name: entropy: 7.950928332152424
                          Source: initial sampleStatic PE information: section name: entropy: 7.491817342209834

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeFile created: C:\ProgramData\Drivers\csrss.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-JNKL5.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\uchardet.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-5D0J9.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\libcrypto-1_1.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MGN69.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\_tkinter.pydJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-JBL11.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\plugins\internal\raw_decode_plugin_c.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\_lzma.pydJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-FRPIR.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Users\user\AppData\Local\Temp\is-LSO40.tmp\_isetup\_RegDLL.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_tta.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\sd.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\unins000.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\plugins\internal\is-FSKC9.tmpJump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\153C.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeFile created: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\plugins\internal\is-EM1PF.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\plugins\internal\peak_scanner_plugin_c.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\takdec.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-9PABP.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S509N.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\_bz2.pydJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\select.pydJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-9EEN2.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S8DR3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-JUUQK.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\dsd2pcmt.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\ff_helper.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-8RHLH.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MF4KB.tmpJump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\2635.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-SELVI.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Users\user\AppData\Local\Temp\is-LSO40.tmp\_isetup\_setup64.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-4NREN.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\da.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\_socket.pydJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\libssl-1_1.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\libdtsdec.dll (copy)Jump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\F280.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S2I8K.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\libvorbis.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\libsox-3.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\tk86t.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassdsd.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassalac.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-RUS1B.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-VB4M3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\wavpackdll.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-SCE6L.tmpJump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\CAC0.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E4V7I.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-N4QUM.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\tak_deco_lib.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-39T3N.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-3NL81.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\basswma.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\_hashlib.pydJump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\E753.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E9NSK.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\dstt.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-8GNBU.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\7z.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MDJ3J.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\opusenc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-2AO2J.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\libwebp.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-J4IUM.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-I133A.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\basswv.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-B5B8O.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\sqlite3.dll (copy)Jump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\2BD.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassopus.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\_ssl.pydJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-APCUM.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-0CFF9.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-U33RE.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\gain_analysis.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Users\user\AppData\Local\Temp\is-LSO40.tmp\_isetup\_iscrypt.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\basscd.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Users\user\AppData\Local\Temp\is-LSO40.tmp\_isetup\_shfoldr.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-A9ADB.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-VP29V.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\libsoxr.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\python37.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\lame_enc.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_fx.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\unicodedata.pydJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-41K4U.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-VA2MS.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-6KLJM.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeFile created: C:\ProgramData\Drivers\csrss.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\daiso.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-AQMS9.tmpJump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\E212.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\OptimFROG.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\rbuttontray.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\mp3gain.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\libmp4v2.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassflac.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassmix.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\d_writer.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-BI9RT.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-DTJ6P.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\rg_ebur128.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassape.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\libFLAC_dynamic.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\pcm2dsd.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\_ctypes.pydJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeFile created: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-DD71M.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_ofr.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-3R28B.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassmidi.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\VCRUNTIME140.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_aac.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-RB2I0.tmpJump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jvjdeaeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\dsd2.dll (copy)Jump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\D89C.exeJump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\atjdeaeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl86t.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\is-JCIME.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-O87JD.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-P98GR.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Users\user\AppData\Local\Temp\is-LSO40.tmp\_isetup\_isdecmp.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\utils.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpFile created: C:\Program Files (x86)\RButtonTRAY\bin\x86\libwinpthread-1.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeFile created: C:\ProgramData\Drivers\csrss.exeJump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\atjdeaeJump to dropped file
                          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jvjdeaeJump to dropped file

                          Boot Survival

                          barindex
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeWindow searched: window name: RegmonClass
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeWindow searched: window name: FilemonClass
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                          Source: C:\Windows\System32\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\ConfigJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CSRSSJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CSRSSJump to behavior

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\27i42a6qag.exeJump to behavior
                          Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\atjdeae:Zone.Identifier read attributes | deleteJump to behavior
                          Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\jvjdeae:Zone.Identifier read attributes | deleteJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285B3E10 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,16_2_00007FF7285B3E10
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\153C.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\fodhelper.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\fodhelper.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\fodhelper.exeProcess information set: NOOPENFILEERRORBOX

                          Malware Analysis System Evasion

                          barindex
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_18-23194
                          Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeSystem information queried: FirmwareTableInformation
                          Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: \KnownDlls32\sElF.eXE
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                          Source: 27i42a6Qag.exe, 00000000.00000002.1282883662.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOKK
                          Source: atjdeae, 0000000D.00000002.1516363901.0000000000ABE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeSpecial instruction interceptor: First address: 0000000000D6AE6C instructions caused by: Self-modifying code
                          Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
                          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1434Jump to behavior
                          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 984Jump to behavior
                          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 360Jump to behavior
                          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 499Jump to behavior
                          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 723Jump to behavior
                          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 720Jump to behavior
                          Source: C:\ProgramData\Drivers\csrss.exeWindow / User API: threadDelayed 6000
                          Source: C:\ProgramData\Drivers\csrss.exeWindow / User API: threadDelayed 5382
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-JNKL5.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\uchardet.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-5D0J9.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MGN69.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-JBL11.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\plugins\internal\raw_decode_plugin_c.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-FRPIR.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-LSO40.tmp\_isetup\_RegDLL.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_tta.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\sd.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\unins000.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\plugins\internal\is-FSKC9.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\plugins\internal\peak_scanner_plugin_c.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\plugins\internal\is-EM1PF.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\takdec.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-9PABP.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S509N.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-9EEN2.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S8DR3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-JUUQK.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\dsd2pcmt.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\ff_helper.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-8RHLH.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MF4KB.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-LSO40.tmp\_isetup\_setup64.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-SELVI.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\da.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-4NREN.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\libdtsdec.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S2I8K.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\libvorbis.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\libsox-3.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassdsd.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassalac.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-RUS1B.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\wavpackdll.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-VB4M3.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-SCE6L.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E4V7I.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\tak_deco_lib.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-N4QUM.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-39T3N.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-3NL81.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\basswma.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E9NSK.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\dstt.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-8GNBU.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\7z.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\opusenc.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MDJ3J.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-2AO2J.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\libwebp.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\basswv.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-I133A.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-J4IUM.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\sqlite3.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-B5B8O.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassopus.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-U33RE.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-0CFF9.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\gain_analysis.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-APCUM.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\basscd.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-LSO40.tmp\_isetup\_shfoldr.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-A9ADB.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-VP29V.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\libsoxr.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\lame_enc.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_fx.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI19202\unicodedata.pydJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-41K4U.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-6KLJM.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-VA2MS.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\daiso.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-AQMS9.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\OptimFROG.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\rbuttontray.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\mp3gain.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\libmp4v2.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassflac.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassmix.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\d_writer.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-BI9RT.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\rg_ebur128.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-DTJ6P.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassape.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\pcm2dsd.exe (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\libFLAC_dynamic.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-DD71M.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_ofr.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-3R28B.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bassmidi.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_aac.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-RB2I0.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\dsd2.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\is-JCIME.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-O87JD.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-P98GR.tmpJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-LSO40.tmp\_isetup\_isdecmp.dllJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\utils.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmpDropped PE file which has not been started: C:\Program Files (x86)\RButtonTRAY\bin\x86\libwinpthread-1.dll (copy)Jump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_18-23362
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_18-23490
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeAPI coverage: 2.7 %
                          Source: C:\Windows\explorer.exe TID: 2144Thread sleep time: -143400s >= -30000sJump to behavior
                          Source: C:\Windows\explorer.exe TID: 5884Thread sleep time: -98400s >= -30000sJump to behavior
                          Source: C:\Windows\explorer.exe TID: 6492Thread sleep time: -36000s >= -30000sJump to behavior
                          Source: C:\Windows\explorer.exe TID: 6256Thread sleep time: -49900s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exe TID: 6548Thread sleep count: 89 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exe TID: 5968Thread sleep count: 228 > 30Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exe TID: 5968Thread sleep time: -135000s >= -30000sJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\E212.exe TID: 6840Thread sleep time: -90000s >= -30000s
                          Source: C:\ProgramData\Drivers\csrss.exe TID: 4268Thread sleep count: 6000 > 30
                          Source: C:\ProgramData\Drivers\csrss.exe TID: 4268Thread sleep time: -600000s >= -30000s
                          Source: C:\ProgramData\Drivers\csrss.exe TID: 6364Thread sleep count: 5382 > 30
                          Source: C:\ProgramData\Drivers\csrss.exe TID: 6364Thread sleep time: -538200s >= -30000s
                          Source: C:\Windows\SysWOW64\explorer.exe TID: 4188Thread sleep time: -30000s >= -30000s
                          Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Name FROM Win32_Processor
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\ProgramData\Drivers\csrss.exeLast function: Thread delayed
                          Source: C:\ProgramData\Drivers\csrss.exeLast function: Thread delayed
                          Source: C:\ProgramData\Drivers\csrss.exeLast function: Thread delayed
                          Source: C:\ProgramData\Drivers\csrss.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D09E4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,16_2_00007FF7285D09E4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C6744 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,16_2_00007FF7285C6744
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C6744 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,16_2_00007FF7285C6744
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285B7850 FindFirstFileExW,FindClose,16_2_00007FF7285B7850
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00646CD1 _free,_free,FindFirstFileExW,18_2_00646CD1
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00646D85 FindFirstFileExW,FindNextFileW,FindClose,18_2_00646D85
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285D09E4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,22_2_00007FF7285D09E4
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB23A3F6A0 GetSystemInfo,VirtualAlloc,22_2_00007FFB23A3F6A0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\Local\Temp\_MEI19202\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\Local\Temp\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\Local\Temp\_MEI19202\tcl\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\Local\
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeFile opened: C:\Users\user~1\AppData\
                          Source: explorer.exe, 00000002.00000000.1263463862.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000I
                          Source: explorer.exe, 00000002.00000000.1263990778.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
                          Source: svchost.exe, 00000005.00000002.3816143933.000001CA9084D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                          Source: explorer.exe, 00000002.00000000.1263990778.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9dVMware20,1
                          Source: svchost.exe, 00000005.00000002.3817843789.000001CA90864000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000e1}
                          Source: CAC0.exe, 0000000F.00000003.1721883563.00000000033DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ntor-onion-key zeABkSC5U36c9jPkbqVUzrjd6qt+/Rti3yHGfsRtYhY
                          Source: CAC0.exe, 0000000F.00000003.1732167451.00000000033ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MIGJAoGBAJtcCCBEuPXqEMu2rREZdSYB+1TY6HE/BWrbN1/ZfMwxUulfEocqfD/3
                          Source: svchost.exe, 00000005.00000002.3819383666.000001CA90902000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                          Source: svchost.exe, 00000005.00000002.3815311336.000001CA9082B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                          Source: CAC0.exe, 0000000F.00000003.1832876154.00000000033E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MIGJAoGBAMZvmci/v9lu2mS+O/M3cUaAMvMrIOsTCKVWdgTHvKYn6UHCdNCgnztj
                          Source: explorer.exe, 00000002.00000000.1263990778.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
                          Source: explorer.exe, 00000002.00000000.1263990778.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                          Source: explorer.exe, 00000002.00000000.1264685341.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_xU1
                          Source: CAC0.exe, 0000000F.00000003.1727000016.00000000033D2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: id ed25519 5uD7nVmCI5DppHHtx2H+7AzbTP39/UvAQinqkc/a/lg
                          Source: svchost.exe, 0000000B.00000002.3814874700.000002413762B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: CAC0.exe, 0000000F.00000003.1727000016.00000000033D2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MIGJAoGBALTKLm+Dn2//Wdsm4wVkqC6KdyxM64ihWRVmcinNdv7gngpzrQ45dqJm
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
                          Source: svchost.exe, 00000005.00000002.3819004186.000001CA9088C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "@\??\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                          Source: CAC0.exe, 0000000F.00000003.1741185270.00000000033F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MIGJAoGBANR5BdXVbpdMX3Ob1V3BfuQemU8uU69NjLB2JC4zlLSJaVSbQRjWJMEV
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008F7B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
                          Source: svchost.exe, 00000005.00000002.3815311336.000001CA9082B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\machine.inf_loc5
                          Source: explorer.exe, 00000002.00000000.1263990778.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware20,1
                          Source: explorer.exe, 00000002.00000000.1263990778.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMWare
                          Source: svchost.exe, 00000005.00000002.3813042118.000001CA90802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
                          Source: explorer.exe, 00000002.00000000.1264685341.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008F27000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT`
                          Source: explorer.exe, 00000002.00000000.1263990778.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
                          Source: explorer.exe, 00000002.00000000.1263990778.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
                          Source: explorer.exe, 00000002.00000000.1263463862.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                          Source: explorer.exe, 00000002.00000000.1263990778.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                          Source: explorer.exe, 00000002.00000000.1266580071.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                          Source: svchost.exe, 00000005.00000002.3819004186.000001CA9088C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                          Source: explorer.exe, 00000002.00000000.1263463862.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeAPI call chain: ExitProcess graph end nodegraph_18-23680
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeAPI call chain: ExitProcess graph end nodegraph_18-23249
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeAPI call chain: ExitProcess graph end nodegraph_18-23323
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeAPI call chain: ExitProcess graph end nodegraph_18-23168
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeSystem information queried: ModuleInformationJump to behavior
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeProcess information queried: ProcessInformationJump to behavior

                          Anti Debugging

                          barindex
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeSystem information queried: CodeIntegrityInformationJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeSystem information queried: CodeIntegrityInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeSystem information queried: CodeIntegrityInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeThread information set: HideFromDebugger
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeOpen window title or class name: regmonclass
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeOpen window title or class name: gbdyllo
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeOpen window title or class name: procmon_window_class
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeOpen window title or class name: ollydbg
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeOpen window title or class name: filemonclass
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeProcess queried: DebugPortJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess queried: DebugPort
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess queried: DebugPort
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeProcess queried: DebugObjectHandle
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeProcess queried: DebugPort
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_004029BA LdrLoadDll,0_2_004029BA
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C9B14 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FF7285C9B14
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00401450 VirtualAlloc,LoadLibraryA,GetProcAddress,GetProcAddress,VirtualProtect,lstrlenW,CreateThread,Sleep,WaitForSingleObject,18_2_00401450
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AB0D90 mov eax, dword ptr fs:[00000030h]0_2_00AB0D90
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00AB092B mov eax, dword ptr fs:[00000030h]0_2_00AB092B
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeCode function: 0_2_00ADF92A push dword ptr fs:[00000030h]0_2_00ADF92A
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_009D0D90 mov eax, dword ptr fs:[00000030h]13_2_009D0D90
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_009D092B mov eax, dword ptr fs:[00000030h]13_2_009D092B
                          Source: C:\Users\user\AppData\Roaming\atjdeaeCode function: 13_2_00ACFA22 push dword ptr fs:[00000030h]13_2_00ACFA22
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_051A40A3 push dword ptr fs:[00000030h]14_2_051A40A3
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_05360042 push dword ptr fs:[00000030h]14_2_05360042
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00401450 mov edx, dword ptr fs:[00000030h]18_2_00401450
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00645255 mov eax, dword ptr fs:[00000030h]18_2_00645255
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00635420 mov eax, dword ptr fs:[00000030h]18_2_00635420
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_0063B57B mov eax, dword ptr fs:[00000030h]18_2_0063B57B
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00990D90 mov eax, dword ptr fs:[00000030h]20_2_00990D90
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_0099092B mov eax, dword ptr fs:[00000030h]20_2_0099092B
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeCode function: 20_2_00B1EF77 push dword ptr fs:[00000030h]20_2_00B1EF77
                          Source: C:\ProgramData\Drivers\csrss.exeCode function: 21_2_05600083 push dword ptr fs:[00000030h]21_2_05600083
                          Source: C:\ProgramData\Drivers\csrss.exeCode function: 21_2_05800042 push dword ptr fs:[00000030h]21_2_05800042
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D25D0 GetProcessHeap,16_2_00007FF7285D25D0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285C9B14 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FF7285C9B14
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285BAE30 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_00007FF7285BAE30
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285BB6CC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FF7285BB6CC
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285BB8B0 SetUnhandledExceptionFilter,16_2_00007FF7285BB8B0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_004080B3 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_004080B3
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00407F4E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_00407F4E
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_004041C7 SetUnhandledExceptionFilter,18_2_004041C7
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_004059BA _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_004059BA
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00636230 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_00636230
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_006433F9 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_006433F9
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00635D29 SetUnhandledExceptionFilter,18_2_00635D29
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_00635D35 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_00635D35
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FF7285C9B14 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00007FF7285C9B14
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB0BA44FED __scrt_fastfail,IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00007FFB0BA44FED
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB22653EF0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00007FFB22653EF0
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB226540CC SetUnhandledExceptionFilter,22_2_00007FFB226540CC
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB22653528 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,22_2_00007FFB22653528
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB226A5088 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,22_2_00007FFB226A5088
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB226A5A50 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00007FFB226A5A50
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB226A5C2C SetUnhandledExceptionFilter,22_2_00007FFB226A5C2C
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB23A41808 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,22_2_00007FFB23A41808
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB23A42380 SetUnhandledExceptionFilter,22_2_00007FFB23A42380
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 22_2_00007FFB23A421A4 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00007FFB23A421A4
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeMemory allocated: page read and write | page guard

                          HIPS / PFW / Operating System Protection Evasion

                          barindex
                          Source: C:\Windows\explorer.exeFile created: atjdeae.2.drJump to dropped file
                          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.46.59 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 34.143.166.163 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 104.198.2.251 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.45.142 443Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 34.94.245.237 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.88.149 443Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 185.12.79.25 80Jump to behavior
                          Source: C:\Windows\explorer.exeNetwork Connect: 186.13.17.220 80Jump to behavior
                          Source: C:\Windows\SysWOW64\explorer.exeNetwork Connect: 91.215.85.17 80
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_05360110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,14_2_05360110
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeThread created: C:\Windows\explorer.exe EIP: 88C1AD0Jump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeThread created: unknown EIP: 86F1AD0Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeThread created: unknown EIP: 8901A40
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeMemory written: C:\Users\user\AppData\Local\Temp\CAC0.exe base: 400000 value starts with: 4D5AJump to behavior
                          Source: C:\ProgramData\Drivers\csrss.exeMemory written: C:\ProgramData\Drivers\csrss.exe base: 400000 value starts with: 4D5A
                          Source: C:\ProgramData\Drivers\csrss.exeMemory written: C:\ProgramData\Drivers\csrss.exe base: 400000 value starts with: 4D5A
                          Source: C:\Windows\explorer.exeMemory written: PID: 3032 base: 10479C0 value: 90Jump to behavior
                          Source: C:\Windows\explorer.exeMemory written: PID: 6912 base: 7FF710072D10 value: 90Jump to behavior
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                          Source: C:\Users\user\Desktop\27i42a6Qag.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
                          Source: C:\Users\user\AppData\Roaming\atjdeaeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
                          Source: C:\Users\user\AppData\Local\Temp\F280.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read
                          Source: C:\Windows\explorer.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 10479C0Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeProcess created: C:\Users\user\AppData\Local\Temp\CAC0.exe C:\Users\user~1\AppData\Local\Temp\CAC0.exeJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeProcess created: C:\Users\user\AppData\Local\Temp\D89C.exe C:\Users\user~1\AppData\Local\Temp\D89C.exe
                          Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\Sysnative\cmd.exe /C fodhelper
                          Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe fodhelper
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fodhelper.exe "C:\Windows\system32\fodhelper.exe"
                          Source: C:\Windows\System32\fodhelper.exeProcess created: unknown unknown
                          Source: explorer.exe, 00000002.00000000.1264590604.0000000004880000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.1263737241.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.1266580071.0000000009013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                          Source: explorer.exe, 00000002.00000000.1263737241.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                          Source: explorer.exe, 00000002.00000000.1263737241.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
                          Source: explorer.exe, 00000002.00000000.1263463862.0000000000C59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman
                          Source: explorer.exe, 00000002.00000000.1263737241.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D89E0 cpuid 16_2_00007FF7285D89E0
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: GetLocaleInfoA,18_2_00409A8C
                          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
                          Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl8 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl8\8.4 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl8\8.5 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\encoding VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\http1.0 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\msgs VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\opt0.4 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\tzdata VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\tzdata\Africa VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\tzdata\America VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\tzdata\America\Argentina VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\tzdata\America\Indiana VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\tzdata\America\Kentucky VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\tzdata\America\North_Dakota VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\tzdata\Antarctica VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\E212.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\base_library.zip VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\base_library.zip VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\base_library.zip VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\base_library.zip VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\_ctypes.pyd VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\_tkinter.pyd VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\tcl\encoding VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\_hashlib.pyd VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\_socket.pyd VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\base_library.zip VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\select.pyd VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\_ssl.pyd VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\_bz2.pyd VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202\_lzma.pyd VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI19202 VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeQueries volume information: C:\Users\user\AppData\Local\Temp\D89C.exe VolumeInformation
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeCode function: 14_2_00409A91 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,14_2_00409A91
                          Source: C:\Users\user\AppData\Local\Temp\E753.exeCode function: 18_2_005E1300 GetUserNameW,GetComputerNameW,18_2_005E1300
                          Source: C:\Users\user\AppData\Local\Temp\D89C.exeCode function: 16_2_00007FF7285D4E50 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,16_2_00007FF7285D4E50
                          Source: C:\Users\user\AppData\Local\Temp\CAC0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Lowering of HIPS / PFW / Operating System Security Settings

                          barindex
                          Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46} STATEJump to behavior
                          Source: svchost.exe, 0000000A.00000002.3824021036.000001A228902000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
                          Source: svchost.exe, 0000000A.00000002.3824021036.000001A228902000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                          Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
                          Source: C:\Users\user\AppData\Local\Temp\2BD.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntiVirusProduct

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 24.2.2BD.exe.400000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.2.2BD.exe.2ea0e67.15.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.3.2BD.exe.3790000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000018.00000003.1710868011.0000000003BD2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3811903783.0000000000843000.00000040.00000001.01000000.0000001C.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3832224383.00000000032E3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 18.2.E753.exe.5e0000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 18.2.E753.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmp, type: MEMORY
                          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-N4QUM.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-I133A.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E4V7I.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-41K4U.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S2I8K.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S509N.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-P98GR.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MGN69.tmp, type: DROPPED
                          Source: Yara matchFile source: 17.0.E212.exe.920000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000011.00000000.1602475035.0000000000922000.00000020.00000001.01000000.00000009.sdmp, type: MEMORY
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\E212.exe, type: DROPPED
                          Source: Yara matchFile source: 0.3.27i42a6Qag.exe.24a0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.27i42a6Qag.exe.ab0e67.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 13.2.atjdeae.9d0e67.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.2.F280.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.3.F280.exe.af0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 13.2.atjdeae.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.27i42a6Qag.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 13.3.atjdeae.9e0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.2.F280.exe.990e67.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000D.00000003.1464709517.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000002.1709725092.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000D.00000002.1516321517.0000000000A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1283124377.00000000024C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1211760629.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000D.00000002.1515885415.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1653752830.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1283076802.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
                          Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                          Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                          Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                          Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite
                          Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                          Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
                          Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-wal
                          Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                          Source: C:\Windows\SysWOW64\explorer.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                          Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 24.2.2BD.exe.400000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.2.2BD.exe.2ea0e67.15.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 24.3.2BD.exe.3790000.5.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000018.00000003.1710868011.0000000003BD2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3811903783.0000000000843000.00000040.00000001.01000000.0000001C.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000018.00000002.3832224383.00000000032E3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 18.2.E753.exe.5e0000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 18.2.E753.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmp, type: MEMORY
                          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-N4QUM.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-I133A.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E4V7I.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-41K4U.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S2I8K.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S509N.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-P98GR.tmp, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MGN69.tmp, type: DROPPED
                          Source: Yara matchFile source: 17.0.E212.exe.920000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000011.00000000.1602475035.0000000000922000.00000020.00000001.01000000.00000009.sdmp, type: MEMORY
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\E212.exe, type: DROPPED
                          Source: Yara matchFile source: 0.3.27i42a6Qag.exe.24a0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.27i42a6Qag.exe.ab0e67.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 13.2.atjdeae.9d0e67.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.2.F280.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.3.F280.exe.af0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 13.2.atjdeae.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.27i42a6Qag.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 13.3.atjdeae.9e0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.2.F280.exe.990e67.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000D.00000003.1464709517.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000002.1709725092.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000D.00000002.1516321517.0000000000A11000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1283124377.00000000024C1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1211760629.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000D.00000002.1515885415.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1653752830.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1283076802.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                          Valid Accounts21
                          Windows Management Instrumentation
                          1
                          DLL Side-Loading
                          1
                          Abuse Elevation Control Mechanism
                          11
                          Disable or Modify Tools
                          1
                          OS Credential Dumping
                          2
                          System Time Discovery
                          Remote Services11
                          Archive Collected Data
                          Exfiltration Over Other Network Medium2
                          Encrypted Channel
                          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                          Default Accounts13
                          Native API
                          1
                          Windows Service
                          1
                          DLL Side-Loading
                          1
                          Deobfuscate/Decode Files or Information
                          1
                          Credentials in Registry
                          1
                          Account Discovery
                          Remote Desktop Protocol1
                          Data from Local System
                          Exfiltration Over Bluetooth1
                          Application Layer Protocol
                          SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                          Domain Accounts1
                          Exploitation for Client Execution
                          1
                          Registry Run Keys / Startup Folder
                          1
                          Windows Service
                          1
                          Abuse Elevation Control Mechanism
                          Security Account Manager3
                          File and Directory Discovery
                          SMB/Windows Admin Shares1
                          Email Collection
                          Automated Exfiltration1
                          Proxy
                          Data Encrypted for ImpactDNS ServerEmail Addresses
                          Local Accounts2
                          Command and Scripting Interpreter
                          Login Hook712
                          Process Injection
                          3
                          Obfuscated Files or Information
                          NTDS248
                          System Information Discovery
                          Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
                          Cloud AccountsLaunchdNetwork Logon Script1
                          Registry Run Keys / Startup Folder
                          23
                          Software Packing
                          LSA Secrets1
                          Query Registry
                          SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                          Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                          Timestomp
                          Cached Domain Credentials1081
                          Security Software Discovery
                          VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                          External Remote ServicesSystemd TimersStartup ItemsStartup Items1
                          DLL Side-Loading
                          DCSync55
                          Virtualization/Sandbox Evasion
                          Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                          Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                          File Deletion
                          Proc Filesystem3
                          Process Discovery
                          Cloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
                          Exploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt112
                          Masquerading
                          /etc/passwd and /etc/shadow1
                          Application Window Discovery
                          Direct Cloud VM ConnectionsData StagedExfiltration Over Symmetric Encrypted Non-C2 ProtocolWeb ProtocolsInternal DefacementMalvertisingNetwork Topology
                          Supply Chain CompromisePowerShellCronCron55
                          Virtualization/Sandbox Evasion
                          Network Sniffing3
                          System Owner/User Discovery
                          Shared WebrootLocal Data StagingExfiltration Over Asymmetric Encrypted Non-C2 ProtocolFile Transfer ProtocolsExternal DefacementCompromise InfrastructureIP Addresses
                          Compromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd712
                          Process Injection
                          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingExfiltration Over Unencrypted Non-C2 ProtocolMail ProtocolsFirmware CorruptionDomainsNetwork Security Appliances
                          Compromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                          Hidden Files and Directories
                          KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureExfiltration Over Physical MediumDNSResource HijackingDNS ServerGather Victim Org Information
                          Compromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                          Regsvr32
                          GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionExfiltration over USBProxyNetwork Denial of ServiceVirtual Private ServerDetermine Physical Locations
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1365579 Sample: 27i42a6Qag.exe Startdate: 21/12/2023 Architecture: WINDOWS Score: 100 106 Found malware configuration 2->106 108 Malicious sample detected (through community Yara rule) 2->108 110 Antivirus detection for URL or domain 2->110 112 12 other signatures 2->112 10 27i42a6Qag.exe 2->10         started        13 atjdeae 2->13         started        15 svchost.exe 2->15         started        17 7 other processes 2->17 process3 signatures4 150 Detected unpacking (changes PE section rights) 10->150 152 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->152 154 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 10->154 19 explorer.exe 17 22 10->19 injected 156 Maps a DLL or memory area into another process 13->156 158 Checks if the current machine is a virtual machine (disk enumeration) 13->158 160 Creates a thread in another existing process (thread injection) 13->160 162 Changes security center settings (notifications, updates, antivirus, firewall) 15->162 164 Query firmware table information (likely to detect VMs) 17->164 process5 dnsIp6 96 104.21.46.59 CLOUDFLARENETUS United States 19->96 98 104.198.2.251 GOOGLEUS United States 19->98 64 C:\Users\user\AppData\Roaming\jvjdeae, PE32 19->64 dropped 66 C:\Users\user\AppData\Roaming\atjdeae, PE32 19->66 dropped 68 C:\Users\user\AppData\Local\Temp\F280.exe, PE32 19->68 dropped 70 8 other files (5 malicious) 19->70 dropped 114 System process connects to network (likely due to code injection or exploit) 19->114 116 Benign windows process drops PE files 19->116 118 Injects code into the Windows Explorer (explorer.exe) 19->118 120 3 other signatures 19->120 24 E212.exe 19->24         started        27 153C.exe 19->27         started        30 F280.exe 19->30         started        32 9 other processes 19->32 file7 signatures8 process9 dnsIp10 126 Detected unpacking (changes PE section rights) 24->126 128 Query firmware table information (likely to detect VMs) 24->128 130 Tries to detect sandboxes and other dynamic analysis tools (window names) 24->130 146 4 other signatures 24->146 74 C:\Users\user\AppData\Local\Temp\...\153C.tmp, PE32 27->74 dropped 35 153C.tmp 27->35         started        132 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 30->132 134 Maps a DLL or memory area into another process 30->134 136 Checks if the current machine is a virtual machine (disk enumeration) 30->136 138 Creates a thread in another existing process (thread injection) 30->138 92 104.21.13.14 CLOUDFLARENETUS United States 32->92 94 104.21.18.224 CLOUDFLARENETUS United States 32->94 76 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 32->76 dropped 78 C:\Users\user\AppData\Local\...\tk86t.dll, PE32+ 32->78 dropped 80 C:\Users\user\AppData\Local\...\tcl86t.dll, PE32+ 32->80 dropped 82 12 other files (none is malicious) 32->82 dropped 140 System process connects to network (likely due to code injection or exploit) 32->140 142 Detected unpacking (overwrites its own PE header) 32->142 144 UAC bypass detected (Fodhelper) 32->144 148 7 other signatures 32->148 37 CAC0.exe 3 11 32->37         started        42 regsvr32.exe 32->42         started        44 cmd.exe 32->44         started        46 4 other processes 32->46 file11 signatures12 process13 dnsIp14 48 153C.exe 35->48         started        100 185.26.156.109 UBERSPACEDE Germany 37->100 102 104.247.81.52 TEAMINTERNET-CA-ASCA Canada 37->102 104 94 other IPs or domains 37->104 72 C:\ProgramData\Drivers\csrss.exe, PE32 37->72 dropped 122 Found Tor onion address 37->122 124 Tries to detect sandboxes / dynamic malware analysis system (file name check) 42->124 51 conhost.exe 44->51         started        53 fodhelper.exe 44->53         started        55 fodhelper.exe 44->55         started        57 fodhelper.exe 44->57         started        file15 signatures16 process17 file18 62 C:\Users\user\AppData\Local\Temp\...\153C.tmp, PE32 48->62 dropped 59 153C.tmp 48->59         started        process19 file20 84 C:\Program Files (x86)\...\is-S2I8K.tmp, PE32 59->84 dropped 86 C:\Program Files (x86)\...\is-E4V7I.tmp, PE32 59->86 dropped 88 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 59->88 dropped 90 99 other files (none is malicious) 59->90 dropped

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          27i42a6Qag.exe32%ReversingLabs
                          27i42a6Qag.exe47%VirustotalBrowse
                          27i42a6Qag.exe100%AviraHEUR/AGEN.1312672
                          27i42a6Qag.exe100%Joe Sandbox ML
                          SourceDetectionScannerLabelLink
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\7z.exe (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\OptimFROG.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bass.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_aac.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_fx.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_ofr.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bass_tta.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bassalac.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bassape.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\basscd.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bassdsd.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bassflac.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bassmidi.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bassmix.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\bassopus.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\basswma.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\basswv.dll (copy)3%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\d_writer.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\da.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\daiso.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\dsd2.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\dsd2pcmt.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\dstt.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\ff_helper.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\gain_analysis.dll (copy)0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-0CFF9.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-2AO2J.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-39T3N.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-3NL81.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-3R28B.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-41K4U.tmp3%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-4NREN.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-5D0J9.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-6KLJM.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-8GNBU.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-8RHLH.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-9EEN2.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-9PABP.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-A9ADB.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-APCUM.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-AQMS9.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-B5B8O.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-BI9RT.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-DD71M.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-DTJ6P.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E4V7I.tmp3%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E9NSK.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-FRPIR.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-I133A.tmp3%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-J4IUM.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-JBL11.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-JNKL5.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-JUUQK.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MDJ3J.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MF4KB.tmp0%ReversingLabs
                          C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MGN69.tmp3%ReversingLabs
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          https://dynamic.t0%URL Reputationsafe
                          http://henkes-lack-union.de/admin.php0%Avira URL Cloudsafe
                          http://svane-gmbh.de/0%Avira URL Cloudsafe
                          http://kalyta.de/pma/0%Avira URL Cloudsafe
                          https://www.ev-stadtmission.de/wp-content/plugins/eventon-lite/assets/js/lib/handlebars.js?ver=2.2.50%Avira URL Cloudsafe
                          https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/owl-carousel.js?ver=6.4.20%Avira URL Cloudsafe
                          http://mandyundmartin.de/administrator/index.php0%Avira URL Cloudsafe
                          http://x1.c.lencr.org/F90%Avira URL Cloudsafe
                          https://www.holidaypark.de/sites/default/files/public/brand/logos/Holiday%20Park.jpg0%Avira URL Cloudsafe
                          http://svane-gmbh.de/0%VirustotalBrowse
                          http://gaukler.de/administrator/MT0%Avira URL Cloudsafe
                          http://autohaus-helmering.de/administrator/index.php0%Avira URL Cloudsafe
                          https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/modules/scripts.js?ver=200654746200%Avira URL Cloudsafe
                          http://schreib-mal-wieder.de/0%Avira URL Cloudsafe
                          https://varga-marine.com/wp-includes/css/dashicons.min.css?ver=5.3.160%Avira URL Cloudsafe
                          https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/headline_ro0%Avira URL Cloudsafe
                          https://www.plopsaquahannutlanden.be/de/#/convious0%Avira URL Cloudsafe
                          http://imagro.de/wp-login.php00%Avira URL Cloudsafe
                          https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_160x160--2020_07_07__0%Avira URL Cloudsafe
                          http://ifdnzact.com/?dn=csiny.de&pid=9PO755G95100%Avira URL Cloudphishing
                          http://schreib-mal-wieder.de/0%VirustotalBrowse
                          https://tip-edv.de/wp-includes/js/underscore.min.js?ver=1.13.30%Avira URL Cloudsafe
                          http://findibus.de/wp-admin/0%Avira URL Cloudsafe
                          https://edv-jupiter.de/wp-admin/0%Avira URL Cloudsafe
                          https://www.ib-dahlke.de/wp-json/0%Avira URL Cloudsafe
                          https://tip-edv.de/wp-content/themes/TiPEDV_1_8_WP/favicon.ico0%Avira URL Cloudsafe
                          http://invema-ev.de/0%Avira URL Cloudsafe
                          http://sina-spielzeug.de/wp-includes/css/dashicons.min.css?ver=6.4.20%Avira URL Cloudsafe
                          http://svane-gmbh.de/phpMyAdmin/0%Avira URL Cloudsafe
                          https://www.loewen-sprudel.de/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.loewen-sprudel.de%2F&#00%Avira URL Cloudsafe
                          https://www.ev-stadtmission.de/wp-login.php?action=lostpassword0%Avira URL Cloudsafe
                          http://invema-ev.de/0%VirustotalBrowse
                          http://hachtmann.de/admin.de0%Avira URL Cloudsafe
                          http://www.b1-automobile.de/wp-content/themes/b1automobile/css/plugins/jquery.fancybox.css?ver=3.3.10%Avira URL Cloudsafe
                          http://ebz-mtk.de/wp-login.php0%Avira URL Cloudsafe
                          https://www.wrocklage.de/internetagentur/0%Avira URL Cloudsafe
                          https://klempner-kalyta.com/#organization0%Avira URL Cloudsafe
                          http://esperanza-tours.de/pma/0%Avira URL Cloudsafe
                          http://fleischmann-fam.de/22220%Avira URL Cloudsafe
                          https://klempner-kalyta.com/feed/0%Avira URL Cloudsafe
                          https://www.wrocklage.de/internetagentur/0%VirustotalBrowse
                          http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI4ODk0MzQ0fH0%Avira URL Cloudsafe
                          http://etallbau-renner.de/0%Avira URL Cloudsafe
                          https://www.hostblogger.de/blog/0%Avira URL Cloudsafe
                          https://klempner-kalyta.com/#organization0%VirustotalBrowse
                          https://invema-ev.de/wp-content/uploads/2016/02/IMG_7209-e1455101250578-1200x450.jpg0%Avira URL Cloudsafe
                          http://bs-mietpark.de/admin.phpI0%Avira URL Cloudsafe
                          http://flugplatzmuseumcottbus.de/phpMyAdmin/GV0%Avira URL Cloudsafe
                          https://klempner-kalyta.com/wp-content/uploads/2023/09/Kalyta-Klempner-AGB.pdf0%Avira URL Cloudsafe
                          https://wetzel-industrieelektronik.de/PhpMyAdmin/0%Avira URL Cloudsafe
                          https://www.hostblogger.de/blog/0%VirustotalBrowse
                          http://bs-mietpark.de/admin.phpj0%Avira URL Cloudsafe
                          http://wom87.de/wp-content/themes/jannah/assets/css/plugins/shortcodes.min.css0%Avira URL Cloudsafe
                          https://klempner-kalyta.com/wp-content/litespeed/css/cdbb8188db2fe7b2754909fe40100698.css?ver=0f32c0%Avira URL Cloudsafe
                          http://joerndettmer.de/wp-login.php0%Avira URL Cloudsafe
                          https://www.ratgeber-frankfurt.de/computersicherheit-fuer-unternehmen-frankfurt.html0%Avira URL Cloudsafe
                          http://holidaypark.de/wp-login.phpt0%Avira URL Cloudsafe
                          http://koeln-stadt.de/pma/0%Avira URL Cloudsafe
                          http://ulrichmohr.de/phpmyadmin/0%Avira URL Cloudsafe
                          https://invema-ev.de/comments/feed/0%Avira URL Cloudsafe
                          https://www.ev-stadtmission.de/feed/0%Avira URL Cloudsafe
                          http://weissingers.de/dmin/0%Avira URL Cloudsafe
                          https://netclue.de/wp-includes/js/wp-util.min.js?ver=6.3.20%Avira URL Cloudsafe
                          http://holidaypark.de/pies.d0%Avira URL Cloudsafe
                          http://ib-dahlke.de/administrator/index.php0%Avira URL Cloudsafe
                          https://varga-marine.com/xmlrpc.php0%Avira URL Cloudsafe
                          http://invema-kreuztal.de/der-verein/spendenkonto//0%Avira URL Cloudsafe
                          https://invema-kreuztal.de/wp-content/uploads/2016/02/am_logo-klein.png0%Avira URL Cloudsafe
                          https://maxtek.de/administrator/0%Avira URL Cloudsafe
                          http://dkorten.de/adminl.de:460%Avira URL Cloudsafe
                          https://www.ev-stadtmission.de/schaukasten/0%Avira URL Cloudsafe
                          http://cgforge.de/pma/0%Avira URL Cloudsafe
                          https://unikat-holzverarbeitung.de/wp-content/themes/betheme/js/menu.js?ver=14.30%Avira URL Cloudsafe
                          http://kunstflieger.de/phpmyadmin/0%Avira URL Cloudsafe
                          https://martin-muniz-fotografie.de/administrator/0%Avira URL Cloudsafe
                          https://assets.jimstatic.com/0%Avira URL Cloudsafe
                          http://koeln-stadt.de/phpMyAdmin/0%Avira URL Cloudsafe
                          https://www.ev-stadtmission.de/wp-admin/css/l10n.min.css?ver=6.4.20%Avira URL Cloudsafe
                          http://joerndettmer.de/wp-content/plugins/cookie-notice/js/front.min.js?ver=2.4.130%Avira URL Cloudsafe
                          http://motorad-eu.de/administrator/e-packende-werbung.de0%Avira URL Cloudsafe
                          http://bs-mietpark.de/phpMyAdmin/0%Avira URL Cloudsafe
                          http://compdesk.de/phpMyAdmin/KQy0%Avira URL Cloudsafe
                          https://www.ev-stadtmission.de/wp-content/plugins/getwid/vendors/slick/slick/slick.min.css?ver=1.9.00%Avira URL Cloudsafe
                          http://gidl.de/PhpMyAdmin/-10%Avira URL Cloudsafe
                          http://www.buecker-kunststoffe.de/PhpMyAdmin/:0%Avira URL Cloudsafe
                          https://invema-ev.de/wp-content/uploads/2018/03/INVEMA_Bogenschiessen-640x240.jpg0%Avira URL Cloudsafe
                          https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/heading/hea0%Avira URL Cloudsafe
                          https://www.ev-stadtmission.de/wp-content/plugins/getwid/vendors/slick/slick/slick-theme.min.css?ver0%Avira URL Cloudsafe
                          https://www.mfc-potsdam.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.10%Avira URL Cloudsafe
                          http://auditeam-bonn.de/admin.php0%Avira URL Cloudsafe
                          http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI5MTE1Y2M4fH0%Avira URL Cloudsafe
                          http://holidaypark.de/wp-login.php0%Avira URL Cloudsafe
                          https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/portfolio/i0%Avira URL Cloudsafe
                          http://ib-dahlke.de/phpmyadmin/u0%Avira URL Cloudsafe
                          https://kunstflieger.de/datenschutzerklaerung/0%Avira URL Cloudsafe
                          http://compdesk.de/wp-admin/0%Avira URL Cloudsafe
                          No contacted domains info
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://henkes-lack-union.de/admin.phpCAC0.exe, 0000000F.00000003.2277407606.0000000060654000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          http://kalyta.de/pma/CAC0.exe, 0000000F.00000003.2288140248.00000000607F6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.00000000607F6000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://svane-gmbh.de/CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://yogajoye.de/wp-content/themes/ark/assets/scripts/components/owl-carousel.js?ver=6.4.2CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006026000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296432424.0000000003C56000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.ev-stadtmission.de/wp-content/plugins/eventon-lite/assets/js/lib/handlebars.js?ver=2.2.5CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://mandyundmartin.de/administrator/index.phpCAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://x1.c.lencr.org/F9CAC0.exe, 0000000F.00000003.2245291519.0000000046C08000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046C08000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.holidaypark.de/sites/default/files/public/brand/logos/Holiday%20Park.jpgCAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046D74000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264066594.0000000060FE8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://gaukler.de/administrator/MTCAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.loewen-sprudel.de/wp-content/themes/fieldsets-ols/modules/scripts.js?ver=20065474620CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://autohaus-helmering.de/administrator/index.phpCAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060836000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060837000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schreib-mal-wieder.de/CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://oss.maxcdn.com/respond/1.4.2/respond.min.jsCAC0.exe, 0000000F.00000003.2242429453.0000000060E63000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046996000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000605C0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605BF000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2236657102.0000000060EA7000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://varga-marine.com/wp-includes/css/dashicons.min.css?ver=5.3.16CAC0.exe, 0000000F.00000003.2236657102.0000000060F53000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/headline_roCAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262915579.00000000610CA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://imagro.de/wp-login.php0CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.plopsaquahannutlanden.be/de/#/conviousCAC0.exe, 0000000F.00000003.2232753903.0000000060FE9000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://yogajoye.de/wp-content/uploads/freshframework/ff_fresh_favicon/favicon_160x160--2020_07_07__CAC0.exe, 0000000F.00000003.2240944340.0000000060B91000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://ifdnzact.com/?dn=csiny.de&pid=9PO755G95CAC0.exe, 0000000F.00000003.2255778739.00000000607CB000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: phishing
                            unknown
                            https://tip-edv.de/wp-includes/js/underscore.min.js?ver=1.13.3CAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046315000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000605E7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://findibus.de/wp-admin/CAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://edv-jupiter.de/wp-admin/CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.ib-dahlke.de/wp-json/CAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://tip-edv.de/wp-content/themes/TiPEDV_1_8_WP/favicon.icoCAC0.exe, 0000000F.00000003.2288140248.000000006084E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006084E000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://invema-ev.de/CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://sina-spielzeug.de/wp-includes/css/dashicons.min.css?ver=6.4.2CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060490000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://svane-gmbh.de/phpMyAdmin/CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000003.00000003.1364433021.000001DE9BE61000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1366562297.000001DE9BE65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364584476.000001DE9BE59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368185082.000001DE9BE3F000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.boldgrid.com/w3-total-cache/CAC0.exe, 0000000F.00000003.2236657102.0000000060EE8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A27000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.ev-stadtmission.de/wp-login.php?action=lostpasswordCAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.loewen-sprudel.de/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.loewen-sprudel.de%2F&#0CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2266629319.000000004F15E000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://c0.wp.com/c/6.4.2/wp-admin/css/login.min.cssCAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ABA000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231870430.0000000046407000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060331000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://hachtmann.de/admin.deCAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.b1-automobile.de/wp-content/themes/b1automobile/css/plugins/jquery.fancybox.css?ver=3.3.1CAC0.exe, 0000000F.00000003.2240944340.0000000060BE0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B64000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2269213661.0000000060BE3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B65000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ebz-mtk.de/wp-login.phpCAC0.exe, 0000000F.00000003.2255778739.00000000608C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.wrocklage.de/internetagentur/CAC0.exe, 0000000F.00000003.2277407606.000000006034D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C86000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A39000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://klempner-kalyta.com/#organizationCAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://esperanza-tours.de/pma/CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://fleischmann-fam.de/2222CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://klempner-kalyta.com/feed/CAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI4ODk0MzQ0fHCAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://etallbau-renner.de/CAC0.exe, 0000000F.00000003.2292944068.0000000060699000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060699000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.hostblogger.de/blog/CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://invema-ev.de/wp-content/uploads/2016/02/IMG_7209-e1455101250578-1200x450.jpgCAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cacerts.thawte.com/ThawteTLSRSACAG1.crt0CAC0.exe, 0000000F.00000003.2288140248.00000000608F5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060790000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.00000000468C8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006103D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E44000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E54000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://bs-mietpark.de/admin.phpICAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://flugplatzmuseumcottbus.de/phpMyAdmin/GVCAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://klempner-kalyta.com/wp-content/uploads/2023/09/Kalyta-Klempner-AGB.pdfCAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://wetzel-industrieelektronik.de/PhpMyAdmin/CAC0.exe, 0000000F.00000003.2245291519.00000000469C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://bs-mietpark.de/admin.phpjCAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://wom87.de/wp-content/themes/jannah/assets/css/plugins/shortcodes.min.cssCAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://schema.org/WPHeaderCAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://klempner-kalyta.com/wp-content/litespeed/css/cdbb8188db2fe7b2754909fe40100698.css?ver=0f32cCAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2264742142.000000006106D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://joerndettmer.de/wp-login.phpCAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060AA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://dynamic.tsvchost.exe, 00000003.00000003.1364614840.000001DE9BE41000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://www.ratgeber-frankfurt.de/computersicherheit-fuer-unternehmen-frankfurt.htmlCAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A6B000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060341000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060826000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2265775699.0000000045E10000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.0000000060769000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2288140248.0000000060826000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://holidaypark.de/wp-login.phptCAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://koeln-stadt.de/pma/CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ulrichmohr.de/phpmyadmin/CAC0.exe, 0000000F.00000003.2245291519.00000000469D9000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000003.00000003.1364630976.000001DE9BE57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1368243283.000001DE9BE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://invema-ev.de/comments/feed/CAC0.exe, 0000000F.00000003.2255778739.0000000060987000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255457153.000000004694F000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.ev-stadtmission.de/feed/CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://weissingers.de/dmin/CAC0.exe, 0000000F.00000003.2287598938.0000000004026000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://netclue.de/wp-includes/js/wp-util.min.js?ver=6.3.2CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.0000000060483000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://holidaypark.de/pies.dCAC0.exe, 0000000F.00000003.2236657102.0000000060EF0000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260254406.0000000060EF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://ib-dahlke.de/administrator/index.phpCAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://varga-marine.com/xmlrpc.phpCAC0.exe, 0000000F.00000003.2264742142.0000000061081000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://invema-kreuztal.de/der-verein/spendenkonto//CAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://invema-kreuztal.de/wp-content/uploads/2016/02/am_logo-klein.pngCAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://maxtek.de/administrator/CAC0.exe, 0000000F.00000003.2236657102.0000000060EB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://dkorten.de/adminl.de:46CAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.ev-stadtmission.de/schaukasten/CAC0.exe, 0000000F.00000003.2245291519.0000000046A0E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.kfw.de/inlandsfoerderung/Privatpersonen/Bestandsimmobilien/Energetische-Sanierung/?kfwmcCAC0.exe, 0000000F.00000003.2264066594.0000000060FB6000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://unikat-holzverarbeitung.de/wp-content/themes/betheme/js/menu.js?ver=14.3CAC0.exe, 0000000F.00000003.2272244499.0000000046D24000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://cgforge.de/pma/CAC0.exe, 0000000F.00000003.2302111893.0000000046835000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://kunstflieger.de/phpmyadmin/CAC0.exe, 0000000F.00000003.2298762602.0000000006032000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://martin-muniz-fotografie.de/administrator/CAC0.exe, 0000000F.00000003.2245291519.0000000046A98000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2260147890.0000000060CD8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://koeln-stadt.de/phpMyAdmin/CAC0.exe, 0000000F.00000003.2255778739.00000000608A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://assets.jimstatic.com/CAC0.exe, 0000000F.00000003.2272244499.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262179866.00000000611F1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046C96000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2231784348.000000006124D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046CC2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2262392791.0000000046330000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C96000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.ev-stadtmission.de/wp-admin/css/l10n.min.css?ver=6.4.2CAC0.exe, 0000000F.00000003.2277407606.0000000060693000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292296836.0000000060713000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://joerndettmer.de/wp-content/plugins/cookie-notice/js/front.min.js?ver=2.4.13CAC0.exe, 0000000F.00000003.2302111893.000000004687D000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2302111893.0000000046914000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://motorad-eu.de/administrator/e-packende-werbung.deCAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.manitu.de/fehler/404/CAC0.exe, 0000000F.00000003.2296432424.0000000003C82000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://bs-mietpark.de/phpMyAdmin/CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2298762602.0000000006047000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://compdesk.de/phpMyAdmin/KQyCAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://www.ev-stadtmission.de/wp-content/plugins/getwid/vendors/slick/slick/slick.min.css?ver=1.9.0CAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://gidl.de/PhpMyAdmin/-1CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.buecker-kunststoffe.de/PhpMyAdmin/:CAC0.exe, 0000000F.00000003.2277407606.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2297950370.00000000606B5000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2292944068.00000000606B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://invema-ev.de/wp-content/uploads/2018/03/INVEMA_Bogenschiessen-640x240.jpgCAC0.exe, 0000000F.00000003.2245291519.000000004695C000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/heading/heaCAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://cdp.thawte.com/ThawteTLSRSACAG1.crlCAC0.exe, 0000000F.00000003.2292944068.00000000605AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://www.mfc-potsdam.de/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1CAC0.exe, 0000000F.00000003.2308182093.0000000046CB2000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000603D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.ev-stadtmission.de/wp-content/plugins/getwid/vendors/slick/slick/slick-theme.min.css?verCAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046ADE000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2255778739.000000006099C000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A0A000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232753903.00000000610C7000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2263408810.00000000610C7000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://auditeam-bonn.de/admin.phpCAC0.exe, 0000000F.00000003.2277303486.0000000060C8F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://ebz-mtk.de/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NTg0NGI5MTE1Y2M4fHCAC0.exe, 0000000F.00000003.2308182093.0000000046D34000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046D34000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060A8F000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://holidaypark.de/wp-login.phpCAC0.exe, 0000000F.00000003.2245291519.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2271361346.0000000060B82000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2245291519.0000000046A51000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2272244499.0000000046BD8000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2242825517.0000000060B82000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://ib-dahlke.de/phpmyadmin/uCAC0.exe, 0000000F.00000003.2255778739.0000000060895000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2296957971.0000000060895000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.ib-dahlke.de/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/portfolio/iCAC0.exe, 0000000F.00000003.2232753903.00000000610B1000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2308182093.0000000046C67000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://kunstflieger.de/datenschutzerklaerung/CAC0.exe, 0000000F.00000003.2255778739.0000000060730000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.00000000606E3000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2232292422.0000000046350000.00000004.00000020.00020000.00000000.sdmp, CAC0.exe, 0000000F.00000003.2277407606.000000006041C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://compdesk.de/wp-admin/CAC0.exe, 0000000F.00000003.2269213661.0000000060C55000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              81.169.145.149
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              217.160.223.50
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              217.114.211.46
                                              unknownGermany
                                              31103KEYWEB-ASDEfalse
                                              80.150.3.210
                                              unknownGermany
                                              3320DTAGInternetserviceprovideroperationsDEfalse
                                              85.214.39.237
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              81.169.145.143
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              159.69.223.127
                                              unknownGermany
                                              24940HETZNER-ASDEfalse
                                              217.160.0.131
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              107.189.31.181
                                              unknownUnited States
                                              53667PONYNETUSfalse
                                              78.46.242.76
                                              unknownGermany
                                              24940HETZNER-ASDEfalse
                                              153.126.128.94
                                              unknownJapan7684SAKURA-ASAKURAInternetIncJPfalse
                                              81.169.145.68
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              77.75.255.86
                                              unknownGermany
                                              34432PHH-ASDEfalse
                                              137.226.107.63
                                              unknownGermany
                                              47610RWTH-ASDEfalse
                                              157.90.155.99
                                              unknownUnited States
                                              766REDIRISRedIRISAutonomousSystemESfalse
                                              81.169.145.64
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              217.160.0.250
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              217.160.0.39
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              217.160.223.110
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              128.127.69.77
                                              unknownGermany
                                              45031PROVIDERBOXIPv4IPv6DUS1DEfalse
                                              82.100.220.167
                                              unknownGermany
                                              25394MK-NETZDIENSTE-ASDEfalse
                                              194.48.171.30
                                              unknownGermany
                                              31400ACCELERATED-ITDEfalse
                                              95.142.78.4
                                              unknownGermany
                                              51483SASGCecinastr70DEfalse
                                              128.127.69.76
                                              unknownGermany
                                              45031PROVIDERBOXIPv4IPv6DUS1DEfalse
                                              217.160.0.31
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              81.169.145.150
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              81.169.145.151
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              104.21.18.224
                                              unknownUnited States
                                              13335CLOUDFLARENETUSfalse
                                              81.169.145.152
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              217.160.0.242
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              81.169.145.70
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              217.160.0.244
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              188.40.227.55
                                              unknownGermany
                                              24940HETZNER-ASDEfalse
                                              94.100.254.155
                                              unknownGermany
                                              34086SCZN-ASDEfalse
                                              217.160.223.107
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              82.100.220.30
                                              unknownGermany
                                              25394MK-NETZDIENSTE-ASDEfalse
                                              188.40.97.80
                                              unknownGermany
                                              24940HETZNER-ASDEfalse
                                              85.220.143.6
                                              unknownGermany
                                              25394MK-NETZDIENSTE-ASDEfalse
                                              185.26.156.109
                                              unknownGermany
                                              205766UBERSPACEDEfalse
                                              81.169.145.77
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              104.247.81.54
                                              unknownCanada
                                              206834TEAMINTERNET-CA-ASCAfalse
                                              104.247.81.52
                                              unknownCanada
                                              206834TEAMINTERNET-CA-ASCAfalse
                                              95.142.78.244
                                              unknownGermany
                                              51483SASGCecinastr70DEfalse
                                              217.160.0.66
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              217.160.231.124
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              217.160.122.228
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              217.160.0.60
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              104.16.140.114
                                              unknownUnited States
                                              13335CLOUDFLARENETUSfalse
                                              217.160.122.18
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              217.160.223.38
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              80.237.133.232
                                              unknownGermany
                                              35329GD-EMEA-DC-CGN3DEfalse
                                              217.160.0.111
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              217.160.0.114
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              85.214.52.232
                                              unknownGermany
                                              6724STRATOSTRATOAGDEfalse
                                              134.119.228.42
                                              unknownGermany
                                              34011GD-EMEA-DC-CGN1DEfalse
                                              217.160.223.119
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              37.252.242.196
                                              unknownAustria
                                              42473AS-ANEXIAANEXIAInternetdienstleistungsGmbHATfalse
                                              34.243.184.185
                                              unknownUnited States
                                              16509AMAZON-02USfalse
                                              108.166.43.2
                                              unknownUnited States
                                              19994RACKSPACEUSfalse
                                              82.100.220.40
                                              unknownGermany
                                              25394MK-NETZDIENSTE-ASDEfalse
                                              217.160.223.36
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              104.21.46.59
                                              unknownUnited States
                                              13335CLOUDFLARENETUStrue
                                              188.40.114.206
                                              unknownGermany
                                              24940HETZNER-ASDEfalse
                                              82.165.152.96
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              85.13.162.219
                                              unknownGermany
                                              34788NMM-ASD-02742FriedersdorfHauptstrasse68DEfalse
                                              185.30.32.136
                                              unknownGermany
                                              48324DE-WEBGOwwwwebgodeDEfalse
                                              217.160.0.52
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              217.160.231.112
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              45.9.61.43
                                              unknownGermany
                                              197540NETCUP-ASnetcupGmbHDEfalse
                                              116.202.102.103
                                              unknownGermany
                                              24940HETZNER-ASDEfalse
                                              23.21.234.173
                                              unknownUnited States
                                              14618AMAZON-AESUSfalse
                                              79.200.198.162
                                              unknownGermany
                                              3320DTAGInternetserviceprovideroperationsDEfalse
                                              217.11.48.56
                                              unknownGermany
                                              34240MANITUDEfalse
                                              217.11.49.50
                                              unknownGermany
                                              34240MANITUDEfalse
                                              87.245.17.57
                                              unknownGermany
                                              9145EWETELCloppenburgerStrasse310DEfalse
                                              188.40.218.93
                                              unknownGermany
                                              24940HETZNER-ASDEfalse
                                              104.198.2.251
                                              unknownUnited States
                                              15169GOOGLEUSfalse
                                              91.195.241.232
                                              unknownGermany
                                              47846SEDO-ASDEfalse
                                              188.94.254.98
                                              unknownGermany
                                              15817MITTWALD-ASMittwaldCMServiceGmbHundCoKGDEfalse
                                              217.11.48.80
                                              unknownGermany
                                              34240MANITUDEfalse
                                              84.19.182.8
                                              unknownGermany
                                              31103KEYWEB-ASDEfalse
                                              217.6.158.74
                                              unknownGermany
                                              3320DTAGInternetserviceprovideroperationsDEfalse
                                              64.190.63.111
                                              unknownUnited States
                                              11696NBS11696USfalse
                                              173.203.187.1
                                              unknownUnited States
                                              27357RACKSPACEUSfalse
                                              52.101.68.36
                                              unknownUnited States
                                              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                              116.202.103.155
                                              unknownGermany
                                              24940HETZNER-ASDEfalse
                                              217.19.230.211
                                              unknownBelgium
                                              34762COMBELL-ASBEfalse
                                              80.67.16.8
                                              unknownGermany
                                              34011GD-EMEA-DC-CGN1DEfalse
                                              80.67.18.126
                                              unknownGermany
                                              34011GD-EMEA-DC-CGN1DEfalse
                                              84.246.124.82
                                              unknownGermany
                                              34568CONNECTINGBYTES-ASDEfalse
                                              95.216.199.143
                                              unknownGermany
                                              24940HETZNER-ASDEfalse
                                              193.22.255.33
                                              unknownGermany
                                              24679SSERV-ASDEfalse
                                              104.21.13.14
                                              unknownUnited States
                                              13335CLOUDFLARENETUSfalse
                                              193.22.255.32
                                              unknownGermany
                                              24679SSERV-ASDEfalse
                                              85.13.150.185
                                              unknownGermany
                                              34788NMM-ASD-02742FriedersdorfHauptstrasse68DEfalse
                                              85.8.94.100
                                              unknownGermany
                                              9145EWETELCloppenburgerStrasse310DEfalse
                                              195.30.84.127
                                              unknownGermany
                                              5539SPACENETSpaceNETAGDEfalse
                                              217.160.0.28
                                              unknownGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              194.25.134.12
                                              unknownGermany
                                              3320DTAGInternetserviceprovideroperationsDEfalse
                                              IP
                                              127.0.0.1
                                              Joe Sandbox version:38.0.0 Ammolite
                                              Analysis ID:1365579
                                              Start date and time:2023-12-21 15:26:05 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 15m 11s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:41
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:2
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:27i42a6Qag.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:9527adb6094eab92b0a8c22e2bffe713.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.expl.evad.winEXE@63/1085@0/100
                                              EGA Information:
                                              • Successful, ratio: 90%
                                              HCA Information:
                                              • Successful, ratio: 54%
                                              • Number of executed functions: 165
                                              • Number of non-executed functions: 190
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                              • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, SIHClient.exe, MoUsoCoreWorker.exe, svchost.exe
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtCreateFile calls found.
                                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                              • Report size getting too big, too many NtEnumerateKey calls found.
                                              • Report size getting too big, too many NtOpenFile calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                              • Report size getting too big, too many NtSetInformationFile calls found.
                                              • Report size getting too big, too many NtWriteFile calls found.
                                              • Skipping network analysis since amount of network traffic is too extensive
                                              TimeTypeDescription
                                              15:27:00API Interceptor117259x Sleep call for process: explorer.exe modified
                                              15:27:19Task SchedulerRun new task: Firefox Default Browser Agent 4872126185342D71 path: C:\Users\user\AppData\Roaming\atjdeae
                                              17:24:53AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run CSRSS "C:\ProgramData\Drivers\csrss.exe"
                                              17:25:01AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run CSRSS "C:\ProgramData\Drivers\csrss.exe"
                                              17:25:06API Interceptor6x Sleep call for process: 2BD.exe modified
                                              17:25:27Task SchedulerRun new task: Firefox Default Browser Agent D8DB637B5D5F6CD9 path: C:\Users\user\AppData\Roaming\jvjdeae
                                              17:25:42API Interceptor12656x Sleep call for process: csrss.exe modified
                                              17:25:46API Interceptor65x Sleep call for process: CAC0.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              81.169.145.149S-INV-BROOKSTRO1-476006.docGet hashmaliciousHidden Macro 4.0Browse
                                              • www.alpenblick-beyharting.de/76f6d5/54sdfg7h8j.exe
                                              S-INV-BROOKSTRO1-476006.docGet hashmaliciousUnknownBrowse
                                              • www.alpenblick-beyharting.de/76f6d5/54sdfg7h8j.exe
                                              S-INV-BROOKSTRO1-476006.docGet hashmaliciousUnknownBrowse
                                              • www.alpenblick-beyharting.de/76f6d5/54sdfg7h8j.exe
                                              DOC20221011567890987655600000.exeGet hashmaliciousFormBookBrowse
                                              • www.vc-parts.com/c1no/?-Z4p2V_=aaORAHVU8jVOIyp6KwECcy0815D04Mau8I9MAXHZ01Eeji7uDgcky0tgdc230yJCogSU4EZWC3bmQL2uluyLUyk4voUomJKVlw==&tTph=Pt0lyn-
                                              SecuriteInfo.com.Trojan.DownloaderNET.346.2603.24761.exeGet hashmaliciousFormBookBrowse
                                              • www.vc-parts.com/c1no/?6lSH=8pRhMLk0HFn&R0GtoD=aaORAHVU8jVOIyp6KwECcy0815D04Mau8I9MAXHZ01Eeji7uDgcky0tgdc230yJCogSU4EZWC3bmQL2uluyLUyk4voUomJKVlw==
                                              SecuriteInfo.com.Trojan.DownLoaderNET.447.20977.3617.exeGet hashmaliciousFormBookBrowse
                                              • www.vc-parts.com/c1no/?5j=aaORAHVU8jVOIyp6KwECcy0815D04Mau8I9MAXHZ01Eeji7uDgcky0tgdc230yJCogSU4EZWC3bmQL2uluyLUyk4voUomJKVlw==&l48h=4hyPlr3HNx
                                              9Lzpzg1zJC.exeGet hashmaliciousFormBookBrowse
                                              • www.cosmeticare24.com/fzsg/?3f0PxvQ=KDNFidwGXNZtqLL/hopGE5BKupduGzzovzTgPTwO3Wh4Uv/3p6L6Lf5PmcONbE0qfHR3zM5vrQ==&v0Gl2p=dReDZh6XYj
                                              purchase order.exeGet hashmaliciousFormBookBrowse
                                              • www.mentatrain.info/emh/?4hoDPv=JN6xRlcxT0sLuVjP&vR-lp=K+LvwnSKTN87mYB3OSYAuUhlkP0ELYcUEzrZYiC8aVNCLaJqm0O/2tVNQC7O4kR0XRIdLZbUcg==
                                              documento-03-2020.docGet hashmaliciousUnknownBrowse
                                              • fruehling.tv/arbeit/zR/
                                              PO# 09032020.docGet hashmaliciousUnknownBrowse
                                              • fruehling.tv/arbeit/zR/
                                              SecuriteInfo.com.GenScript.JZD.docGet hashmaliciousEmotet MailPassView QbotBrowse
                                              • mmoehring.de/alt-strato/ENQnQbMFcyz/
                                              8dXGw4Q4Fp.docGet hashmaliciousEmotetBrowse
                                              • tusek.de/cgi-bin/LROR4jp/
                                              nU8O1ayS5g.docGet hashmaliciousEmotetBrowse
                                              • tusek.de/cgi-bin/LROR4jp/
                                              8dXGw4Q4Fp.docGet hashmaliciousEmotetBrowse
                                              • tusek.de/cgi-bin/LROR4jp/
                                              nU8O1ayS5g.docGet hashmaliciousEmotetBrowse
                                              • tusek.de/cgi-bin/LROR4jp/
                                              o8vX7wQV87.docGet hashmaliciousEmotetBrowse
                                              • tusek.de/cgi-bin/LROR4jp/
                                              EsWC0iDptJ.docGet hashmaliciousEmotetBrowse
                                              • tusek.de/cgi-bin/LROR4jp/
                                              ciLODxONiZ.docGet hashmaliciousEmotetBrowse
                                              • tusek.de/cgi-bin/LROR4jp/
                                              YIYu83fiWi.docGet hashmaliciousEmotetBrowse
                                              • tusek.de/cgi-bin/LROR4jp/
                                              EsWC0iDptJ.docGet hashmaliciousEmotetBrowse
                                              • tusek.de/cgi-bin/LROR4jp/
                                              81.169.145.14303062021.exeGet hashmaliciousFormBookBrowse
                                              • www.bezoekburen.com/uqf5/?6lzX=9mpvOPB3vGncX7AM8DKV/fsctxi57GpnqyegryvFrSZMrrltpTCreWiatwm/+6wyk4Kp&EJBD=f0GHX
                                              DHL Documents_AWB_001173980920AD.xlsxGet hashmaliciousFormBookBrowse
                                              • www.stadtstreicherin.com/j5an/?ixlp=q0kW3RN6fEvQDYROPZ//qCuXXaVyIgFcse09HqV9WLntQngQLWwe5g6/p612qexugxgmrA==&0bttHj=iL0xqPwx-fuD
                                              0iEsxw3D7A.exeGet hashmaliciousFormBookBrowse
                                              • www.deutschekorrosionsschutz.net/8rg4/?6l=fUUW/JeYkbdACdSENFBgN1uiTlgk1tmNXm4SvpPhjfWrZwHHONrAi8AxccgvdYnhkBlf&_FN4EJ=3fnDH
                                              5j6RsnL8zx.exeGet hashmaliciousFormBookBrowse
                                              • www.deutschekorrosionsschutz.net/8rg4/?Txlp=fUUW/JeYkbdACdSENFBgN1uiTlgk1tmNXm4SvpPhjfWrZwHHONrAi8AxccgFCoXhgDtf&OHX=JRmh
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              STRATOSTRATOAGDEhttps://github.com/chronosmiki/RANSOMWARE-WANNACRY-2.0/raw/master/Ransomware.WannaCry.zipGet hashmaliciousWannacry, ContiBrowse
                                              • 85.214.62.48
                                              order.exeGet hashmaliciousFormBookBrowse
                                              • 81.169.145.84
                                              order.exeGet hashmaliciousFormBookBrowse
                                              • 81.169.145.84
                                              Agro_Alliance_(Australia)_RFQ.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                              • 81.169.145.84
                                              B843BuO7i3.exeGet hashmaliciousGlupteba, RedLine, SmokeLoaderBrowse
                                              • 81.169.145.97
                                              01b9T4tDdG.exeGet hashmaliciousGlupteba, LummaC Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                              • 85.215.66.179
                                              Malaysian_Agro_Products_Bhd_RFQ.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                              • 81.169.145.84
                                              CV.docGet hashmaliciousFormBookBrowse
                                              • 81.169.145.84
                                              REHABILITATION_SARAMACCA_SPECIFICATIONS.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                              • 81.169.145.84
                                              order_2393.docGet hashmaliciousUnknownBrowse
                                              • 81.169.145.95
                                              S-INV-BROOKSTRO1-476006.docGet hashmaliciousHidden Macro 4.0Browse
                                              • 81.169.145.149
                                              S-INV-BROOKSTRO1-476006.docGet hashmaliciousUnknownBrowse
                                              • 81.169.145.149
                                              S-INV-BROOKSTRO1-476006.docGet hashmaliciousUnknownBrowse
                                              • 81.169.145.149
                                              CamScanner_12-12-2023_01.03.exeGet hashmaliciousFormBook, zgRATBrowse
                                              • 81.169.145.151
                                              45968n.exeGet hashmaliciousUnknownBrowse
                                              • 85.215.218.19
                                              45968n.exeGet hashmaliciousUnknownBrowse
                                              • 85.215.218.19
                                              PI_and_payment_confirmed_pdf.exeGet hashmaliciousFormBook, DBatLoaderBrowse
                                              • 81.169.145.161
                                              SecuriteInfo.com.Exploit.Siggen3.42475.29091.14024.rtfGet hashmaliciousFormBookBrowse
                                              • 81.169.145.159
                                              WrrCV4QR2J.exeGet hashmaliciousFormBookBrowse
                                              • 81.169.145.70
                                              svo0k2D8I1.exeGet hashmaliciousFormBookBrowse
                                              • 81.169.145.84
                                              ONEANDONE-ASBrauerstrasse48DEPARASWIFT.exeGet hashmaliciousFormBookBrowse
                                              • 217.76.128.47
                                              3yPvcmrbqS.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
                                              • 217.160.0.195
                                              http://gerard-yves-riviere.online/new/net/login.phpGet hashmaliciousUnknownBrowse
                                              • 217.160.0.121
                                              order.exeGet hashmaliciousFormBookBrowse
                                              • 212.227.172.251
                                              32f2gxZwCi.exeGet hashmaliciousDanaBot, SmokeLoaderBrowse
                                              • 212.227.239.117
                                              order.exeGet hashmaliciousFormBookBrowse
                                              • 212.227.172.251
                                              SLIP-full_amount-50006654455339877322346689377782.exeGet hashmaliciousFormBookBrowse
                                              • 217.76.128.47
                                              CTM_REQUEST_USD12,400.exeGet hashmaliciousFormBookBrowse
                                              • 213.171.195.105
                                              SLIP-full_amount-50006654455339877322346689377782.exeGet hashmaliciousFormBookBrowse
                                              • 217.76.128.47
                                              ungziped_file.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                              • 217.76.128.47
                                              l133tk9J5P.exeGet hashmaliciousAgentTeslaBrowse
                                              • 213.165.67.119
                                              B843BuO7i3.exeGet hashmaliciousGlupteba, RedLine, SmokeLoaderBrowse
                                              • 74.208.5.3
                                              https://ingergraga.com/vericastloginfirtstep.htmlGet hashmaliciousUnknownBrowse
                                              • 74.208.236.112
                                              https://p.feedblitz.com/t3.asp?/1081591/102442729/7821567_/~feeds.feedblitz.com/~/t/0/0/sethsblog/posts/~//r20.rs6.net/tn.jsp?f=001vFHMoPyMo0WrLNfpX5KrbtnufSjk2FOwtHR22KMN3Rk2jm9egqQ-LneL9hrc8v-KzCiuxG7Tg8qxaN0rQ7VfREnaa5XzjjgpddfwOaxHG28Xxu5OEqHhkN4TqD27DJaibctIlhoejDGVQsZ4d5oq1Q==&c=&ch==&__=//458135578128160485645/tecpnyaagkrtyrenqmwnwbfgzyfpzahhujwsxickhnycomphomjkskgddcxrxyfktaexsxawycoqzkeckcgljhwhgpidahygflxodqdzpmfmbrbbohyiaztkusfetmxieziqfcxoboxiolgacwfnqsfejzytnpadthspbyouhzrssxxzsqxyyqovfuaafdvxjcospeqcixtfl/asxbjvzotxuylbrtxtvi/YXNrYS5jcmF3Zm9yZEB0ZWwuY29tGet hashmaliciousHTMLPhisherBrowse
                                              • 74.208.186.84
                                              phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                                              • 74.208.223.187
                                              SyD1FiOG1p.exeGet hashmaliciousLummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
                                              • 82.165.215.64
                                              https://p.feedblitz.com/t3.asp?/1081591/102442729/7821567_/~feeds.feedblitz.com/~/t/0/0/sethsblog/posts/~//r20.rs6.net/tn.jsp?f=001vFHMoPyMo0WrLNfpX5KrbtnufSjk2FOwtHR22KMN3Rk2jm9egqQ-LneL9hrc8v-KzCiuxG7Tg8qxaN0rQ7VfREnaa5XzjjgpddfwOaxHG28Xxu5OEqHhkN4TqD27DJaibctIlhoejDGVQsZ4d5oq1Q==&c=&ch==&__=//210240038304636551470/ijodgrogeranprgnicfdfriqymezxefyqgrkjqsfgcqeqryikdxurkuspuaowycvcozvhrktaalmijhpkxeylhmxqdsgeavegblqykasxfamfhkfhffdraficfzqpeuvqlyalrrjuuotwbsxzcysavcvrkdnlfnkncgisytgplkienhpjmrxyeckizacsbphdbszkisbpirxu/cglrntaaqwuxgxgdusfd/bGdhbGluZG9AZW5uZWFkLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                              • 50.21.176.212
                                              admindemo.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 213.171.195.105
                                              Order_N#U00b0_202200027.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 74.208.157.30
                                              LAMHgZs8AETIC8S.exeGet hashmaliciousFormBookBrowse
                                              • 217.160.0.116
                                              KEYWEB-ASDEZRgv8wdMtR.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
                                              • 87.118.96.154
                                              More_Details.exeGet hashmaliciousFormBookBrowse
                                              • 95.169.188.200
                                              jhUOH.elfGet hashmaliciousUnknownBrowse
                                              • 87.118.87.48
                                              qCuxSp58cJ.elfGet hashmaliciousMiraiBrowse
                                              • 217.114.209.79
                                              Installer.msiGet hashmaliciousUnknownBrowse
                                              • 87.118.67.143
                                              z2H8jaZbYg.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 217.114.212.73
                                              x86.elfGet hashmaliciousMiraiBrowse
                                              • 217.114.222.50
                                              zOYD7ZSG24.elfGet hashmaliciousUnknownBrowse
                                              • 217.114.209.83
                                              http://britta-huelder.de/Get hashmaliciousUnknownBrowse
                                              • 87.118.120.91
                                              https://www.positiva.gov.co/c/blogs/find_entry?p_1_id=0&noSuchEntryRedirect=https://pathforward.tamu.edu//britta-huelder.de/web/Get hashmaliciousHTMLPhisherBrowse
                                              • 87.118.120.91
                                              https://www.caravancar.it/saturday/rfd.htmlGet hashmaliciousHTMLPhisherBrowse
                                              • 87.118.112.169
                                              https://www.caravancar.it/satur=day/rfd.htmlGet hashmaliciousUnknownBrowse
                                              • 87.118.112.169
                                              tfFA1yjBIa.elfGet hashmaliciousMiraiBrowse
                                              • 217.114.209.59
                                              https://(%5B084d549b35bfe07f5fc9414e12ebc18b%5D):%%5E*&*$%3E+%3C@301.link/Rq#bWFyay5odWRzb25AdmlyZ2lubW9uZXl1a3BsYy5jb20=Get hashmaliciousUnknownBrowse
                                              • 87.118.77.102
                                              YmG9mxwNXUGet hashmaliciousMiraiBrowse
                                              • 217.114.209.27
                                              4mp5IYDycpGet hashmaliciousUnknownBrowse
                                              • 217.114.222.76
                                              JhtKkHKafN.dllGet hashmaliciousWannacryBrowse
                                              • 84.19.164.87
                                              JirrMndkQ2Get hashmaliciousMiraiBrowse
                                              • 217.114.222.54
                                              zz.mpsl.virGet hashmaliciousMiraiBrowse
                                              • 217.114.209.78
                                              Js9VZ7VZzzGet hashmaliciousMiraiBrowse
                                              • 217.114.222.69
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              C:\Program Files (x86)\RButtonTRAY\bin\x86\7z.exe (copy)o7ZHiwiYIJ.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoaderBrowse
                                                tuc4.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                  tuc5.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                    tuc7.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                      tuc6.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                        tuc3.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                          tuc2.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                            tuc5.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                              tuc4.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                ZRgv8wdMtR.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
                                                                  8bsTiV0GLU.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                    BV1YmY2Tbu.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                      G2YUNbuFf7.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                        6F7U67Lsti.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                          7C3J00l6fa.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5Systemz, StealcBrowse
                                                                            8RYB9RzQA5.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5Systemz, StealcBrowse
                                                                              zEiSxvfImr.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
                                                                                tx2WEPjzLS.exeGet hashmaliciousGlupteba, Petite Virus, RedLine, SmokeLoader, Socks5Systemz, Stealc, zgRATBrowse
                                                                                  3yPvcmrbqS.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
                                                                                    xSLm8YQMXX.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoaderBrowse
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):337408
                                                                                      Entropy (8bit):6.515131904432587
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:3nzsyDn7PDS+FDflUjvJUkbEOyF1rOpsuCOuOff5k4F/lTRHA:3377SKfgvqkbFyFJCRRzH
                                                                                      MD5:62D2156E3CA8387964F7AA13DD1CCD5B
                                                                                      SHA1:A5067E046ED9EA5512C94D1D17C394D6CF89CCCA
                                                                                      SHA-256:59CBFBA941D3AC0238219DAA11C93969489B40F1E8B38FABDB5805AC3DD72BFA
                                                                                      SHA-512:006F7C46021F339B6CBF9F0B80CFFA74ABB8D48E12986266D069738C4E6BDB799BFBA4B8EE4565A01E90DBE679A96A2399D795A6EAD6EACBB4818A155858BF60
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Joe Sandbox View:
                                                                                      • Filename: o7ZHiwiYIJ.exe, Detection: malicious, Browse
                                                                                      • Filename: tuc4.exe, Detection: malicious, Browse
                                                                                      • Filename: tuc5.exe, Detection: malicious, Browse
                                                                                      • Filename: tuc7.exe, Detection: malicious, Browse
                                                                                      • Filename: tuc6.exe, Detection: malicious, Browse
                                                                                      • Filename: tuc3.exe, Detection: malicious, Browse
                                                                                      • Filename: tuc2.exe, Detection: malicious, Browse
                                                                                      • Filename: tuc5.exe, Detection: malicious, Browse
                                                                                      • Filename: tuc4.exe, Detection: malicious, Browse
                                                                                      • Filename: ZRgv8wdMtR.exe, Detection: malicious, Browse
                                                                                      • Filename: 8bsTiV0GLU.exe, Detection: malicious, Browse
                                                                                      • Filename: BV1YmY2Tbu.exe, Detection: malicious, Browse
                                                                                      • Filename: G2YUNbuFf7.exe, Detection: malicious, Browse
                                                                                      • Filename: 6F7U67Lsti.exe, Detection: malicious, Browse
                                                                                      • Filename: 7C3J00l6fa.exe, Detection: malicious, Browse
                                                                                      • Filename: 8RYB9RzQA5.exe, Detection: malicious, Browse
                                                                                      • Filename: zEiSxvfImr.exe, Detection: malicious, Browse
                                                                                      • Filename: tx2WEPjzLS.exe, Detection: malicious, Browse
                                                                                      • Filename: 3yPvcmrbqS.exe, Detection: malicious, Browse
                                                                                      • Filename: xSLm8YQMXX.exe, Detection: malicious, Browse
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@..|...|...|...p...|...w...|.d.r...|...v...|...x...|.i.#...|...}.|.|.d.!...|...w...|..V....|...v...|.......|. .z...|.Rich..|.........PE..L....r.b.....................>......\........ ....@.......................................@.....................................x....0.......................@...3................................................... ..(............................text............................... ..`.rdata..r.... ......................@..@.data....'..........................@....sxdata...... ......................@....rsrc........0......................@..@.reloc...<...@...>..................@..B........................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):26526
                                                                                      Entropy (8bit):4.600837395607617
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:Lc56OuAbnn0UReX6wFDVxnFw7xqsvzt+z/k8E9HinIhFkspcM9bc7ups0CZuQG:Lc5trLeDnFMz1ReScmc7GshZuQG
                                                                                      MD5:BD7A443320AF8C812E4C18D1B79DF004
                                                                                      SHA1:37D2F1D62FEC4DA0CAF06E5DA21AFC3521B597AA
                                                                                      SHA-256:B634AB5640E258563C536E658CAD87080553DF6F34F62269A21D554844E58BFE
                                                                                      SHA-512:21AEF7129B5B70E3F9255B1EA4DC994BF48B8A7F42CD90748D71465738D934891BBEC6C6FC6A1CCFAF7D3F35496677D62E2AF346D5E8266F6A51AE21A65C4460
                                                                                      Malicious:false
                                                                                      Preview: GNU LESSER GENERAL PUBLIC LICENSE. Version 2.1, February 1999.. Copyright (C) 1991, 1999 Free Software Foundation, Inc.. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. Everyone is permitted to copy and distribute verbatim copies. of this license document, but changing it is not allowed...[This is the first released version of the Lesser GPL. It also counts. as the successor of the GNU Library Public License, version 2, hence. the version number 2.1.].. Preamble.. The licenses for most software are designed to take away your.freedom to share and change it. By contrast, the GNU General Public.Licenses are intended to guarantee your freedom to share and change.free software--to make sure the software is free for all its users... This license, the Lesser General Public License, applies to some.specially designated software packages--typically libraries--of the.Free Software Foundation and other authors who
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):214016
                                                                                      Entropy (8bit):6.676457645865373
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:v3UEEkp2yVTcc295GSSazZq0/OlxAOxN5jZ2Ti30ezAg0Fu9RBhk1Xion:cEEpYcc2G/adqLtxLZ2+vAO9Hhkzn
                                                                                      MD5:2C747F19BF1295EBBDAB9FB14BB19EE2
                                                                                      SHA1:6F3B71826C51C739D6BB75085E634B2B2EF538BC
                                                                                      SHA-256:D2074B91A63219CFD3313C850B2833CD579CC869EF751B1F5AD7EDFB77BD1EDD
                                                                                      SHA-512:C100C0A5AF52D951F3905884E9B9D0EC1A0D0AEBE70550A646BA6E5D33583247F67CA19E1D045170A286D92EE84E1676A6C1B0527E017A35B6242DD9DEE05AF4
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}6,.9WB.9WB.9WB...9.:WB.9WC.hWB....;WB."..&WB."..WB."...WB.9WB.?WB."..8WB."..8WB."..8WB.Rich9WB.........PE..L......W...........!.....N...........n.......`............................................@.........................`...h.......(....`..X....................p.......................................................`...............................text...?L.......N.................. ..`.rdata......`.......R..............@..@.data....W.......2..................@....rsrc...X....`......................@..@.reloc..f&...p...(..................@..B........................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):127669
                                                                                      Entropy (8bit):7.952352167575405
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:kdGUCKL7Wn/OzU2ThapTv773+HMnBasgGlBM:dn/mU8K/3EgNgoM
                                                                                      MD5:75C1D7A3BDF1A309C540B998901A35A7
                                                                                      SHA1:B06FEEAC73D496C435C66B9B7FF7514CBE768D84
                                                                                      SHA-256:6303F205127C3B16D9CF1BDF4617C96109A03C5F2669341FBC0E1D37CD776B29
                                                                                      SHA-512:8D2BBB7A7AD34529117C8D5A122F4DAF38EA684AACD09D5AD0051FA41264F91FD5D86679A57913E5ADA917F94A5EF693C39EBD8B465D7E69EF5D53EF941AD2EE
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....O?\...........!.................`.......................................p............@..........................b.......a.......0..@...........................................................................<b..H.................................... ..........................@..@.rsrc........0......................@..@......... ...@.........................@petite.......`......................`..`..........................................fE...nj.:<...n...1..}..r..". .S(...#!............7..5.Q..0..}.. .....^y...U...@..3.........&.lp(.pt.a......!..`@C.O3G7..."\..w.1u.$4..1h...M...K6.L...L..~.w...b2x-.......9k".....".V\............o..................qO&.......4(."0.Zy....2..Y..Z..:2.XM..D....a&..&.L,......./+......c<...^.2.x0..H.618....Q.Q.5.%...Z1.I.......a...q-}.0..D....o.!.....O.......B....# O.!....cY5.#...n.`..1...r!.)].:...m.f.....x....N"t.j..l.....:/...,.v........8F.N...X..j.R......"...&...
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):149845
                                                                                      Entropy (8bit):7.893881970959476
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:y0z4JQHu5EvSA/JqiK2s6g+hUCQiMVQ623hi3JKz8KQP6ZwhQrNrbZ:yUju5GY7l+CCYVQ62YUzXQiqhQrJbZ
                                                                                      MD5:526E02E9EB8953655EB293D8BAC59C8F
                                                                                      SHA1:7CA6025602681EF6EFDEE21CD11165A4A70AA6FE
                                                                                      SHA-256:E2175E48A93B2A7FA25ACC6879F3676E04A0C11BB8CDFD8D305E35FD9B5BBBB4
                                                                                      SHA-512:053EB66D17E5652A12D5F7FAF03F02F35D1E18146EE38308E39838647F91517F8A9DC0B7A7748225F2F48B8F0347B0A33215D7983E85FCA55EF8679564471F0B
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....r.[...........!....U....D............... ............................... ............@.........................P...........d............................N..........................................................8............................................@..................@..@.rsrc................B..............@..@.......................................@petite..U.......U....F..............`..`.....................................5....`K...=1.;;..s}....3500.z.<..]goR.lVO..C..j...........O......9#f.S.$1.b.D.8...VX....sb .A.%I......B.........R...Z5.............y......_W.0.!..T..nT.V..J..s.1`..V...Cb.2x0......0B...4...D.`...!.>[7..^;w'.u"W/...).P.m...P.......qF<.~1..T.>F.F.Rr.`...N....3$...w.L..P..SQP]C^.....2...%5.v...3.a`.k....q.0.o..A......k.....B..P.h.fy..jyb...<t$.%c-...<9.1#2.7./0.j.o#~...,!fuJ.M..a...(...0@.........,..t.3d"qva....fm.=.....]....s...z}-X..3................y>.!......g..E
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):34392
                                                                                      Entropy (8bit):7.81689943223162
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:mYBs3O9YL558R6R8P8W2rjQZQtfTIxRYsetoPNvPWIl+syr:vsUY15mqzW2u8rIxisFcJr
                                                                                      MD5:EA245B00B9D27EF2BD96548A50A9CC2C
                                                                                      SHA1:8463FDCDD5CED10C519EE0B406408AE55368E094
                                                                                      SHA-256:4824A06B819CBE49C485D68A9802D9DAE3E3C54D4C2D8B706C8A87B56CEEFBF3
                                                                                      SHA-512:EF1E107571402925AB5B1D9B096D7CEFF39C1245A23692A3976164D0DE0314F726CCA0CB10246FE58A13618FD5629A92025628373B3264153FC1D79B0415D9A7
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ph..4...4...4.......0...[...0...[...6...4.......V...0...`*..........5....)......Rich4...........................PE..L.....T...........!................6 .......................................0......................................D#..y....!..d.......X............................................................................................................................z..................`....rsrc...........X...................@..@....................................`...petite....... ......................`...................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):5960
                                                                                      Entropy (8bit):5.956401374574174
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:dj78cqhzbWKlECE7WbjDFf6IhaYYUOAoDf4+XCVhovG9AkM7Ui10:CjlEJ7WbjDFf6waYvdc4gYAkM10
                                                                                      MD5:B3CC560AC7A5D1D266CB54E9A5A4767E
                                                                                      SHA1:E169E924405C2114022674256AFC28FE493FBFDF
                                                                                      SHA-256:EDDE733A8D2CA65C8B4865525290E55B703530C954F001E68D1B76B2A54EDCB5
                                                                                      SHA-512:A836DECACB42CC3F7D42E2BF7A482AE066F5D1DF08CCCC466880391028059516847E1BF71E4C6A90D2D34016519D16981DDEEACFB94E166E4A9A720D9CC5D699
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L......I...........!.....4...T......6`....... ...............................p......................................lc.......a.......@..H....................................................................................................................0..........................`....rsrc........@..H...................@..@.............P......................@................`......................`.......................................X....E......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!...`..f.`P....h....j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I.e...h....P..0................0..............h.... ..0...........6...........k...........
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):7910
                                                                                      Entropy (8bit):6.931925007191986
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:piDl1jKrGer007ia6abHX0d/aeHeN+VPHIJQxNiJCl9AK0f:IDJ9aDb30dCe+4PHIJrJCl9AK0f
                                                                                      MD5:1268DEA570A7511FDC8E70C1149F6743
                                                                                      SHA1:1D646FC69145EC6A4C0C9CAD80626AD40F22E8CD
                                                                                      SHA-256:F266DBA7B23321BF963C8D8B1257A50E1467FAAAB9952EF7FFED1B6844616649
                                                                                      SHA-512:E19F0EA39FF7AA11830AF5AAD53343288C742BE22299C815C84D24251FA2643B1E0401AF04E5F9B25CAB29601EA56783522DDB06C4195C6A609804880BAE9E9B
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L.....V...........!.................p.......0............................................@.........................Pr.......q..d....P.......................%.......................................................q..8....................................@..........................@..@.rsrc........P......................@..@.............`.........................@petite.......p......................`..`.........................................|7{M..... ........r B`.Zr..P.........T}.e..YJ...=.X..q.}......b.I...G.....^.d...R..-R.....d_.......K.q.H.A=.-S..,_.....L...........2.............u.u.%...:.q....c.[.....`...\.X..8..B.@L..3.7.q.....)!.- ...D.....p...J...RU..Q.A..[.#&..R.....".+4...px/7..\....4...., ..8...5.hV.>] ....3.-.<..I+.<r..T..H,Q..!..i--..+.Zq.[...H... ...N.8..#...a.x.iU.G..-_..R....Z(cT%.....S.P.U:g?...;....&....@..KI.X.Q..PQ..v..*....{..~..}..f....c..`....Q...q..%......,j.4.Y..)....Cf7..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):11532
                                                                                      Entropy (8bit):7.219753259626605
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Dqv1jf+0vAe7Dl+JTGxuK5Rbfh70Il9MWbzq6UWkE0FGemexbiJi8TK0Q2:m9KIAeNgTGxu2Jfh1DMSzqKkvFGLJi85
                                                                                      MD5:073F34B193F0831B3DD86313D74F1D2A
                                                                                      SHA1:3DF5592532619C5D9B93B04AC8DBCEC062C6DD09
                                                                                      SHA-256:C5EEC9CD18A344227374F2BC1A0D2CE2F1797CFFD404A0A28CF85439D15941E9
                                                                                      SHA-512:EEFD583D1F213E5A5607C2CFBAED39E07AEC270B184E61A1BA0B5EF67ED7AC5518B5C77345CA9BD4F39D2C86FCD261021568ED14945E7A7541ADF78E18E64B0C
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L.....V...........!.........(...............P............................................@.........................P...........d....p..8...................82.........................................................8....................................`.......$..................@..@.rsrc........p.......&..............@..@.......................................@petite...............*..............`..`....................................#..L....y......"......O/..M...C.A.&:.e.i..l....CP...g.AK..S;.lf.?.g....].k.U.G.Y.J.",......%....:ge.D x.P }}..Tih.g......%G.Iy.j...\..*.S...s..$..........o..y..........,.........-..X.....v.M1..*'...5R.4..8k!..q.=*BVST<..M.E.._T.p...K.r....C.HEO....\..%%,I....>'.L.ct..{..I..l.Y#f Tk*...:bH?.....G..Y.p..Q.....z/R.h>8....]S.....p.c/.m..6tc.d..(..{...=w4.w.^..d.....^..Tp.....Z.*.).Z."...&.-...o...xD+0.L+!...X.%?)+.P..Z.......P..F..P.".._.%9.^T;(..Y.>.. .....re
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):39304
                                                                                      Entropy (8bit):7.819409739152795
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:i5GGx+OZPWuGdoiwUpPLH7IN3x1eW0kIAJbfT13MMnahRlmftuohQf:i5DxDPWMApPLsNhkVkI6R3TnalauoQ
                                                                                      MD5:C7A50ACE28DDE05B897E000FA398BBCE
                                                                                      SHA1:33DA507B06614F890D8C8239E71D3D1372E61DAA
                                                                                      SHA-256:F02979610F9BE2F267AA3260BB3DF0F79EEEB6F491A77EBBE719A44814602BCC
                                                                                      SHA-512:4CD7F851C7778C99AFED492A040597356F1596BD81548C803C45565975CA6F075D61BC497FCE68C6B4FEDC1D0B5FD0D84FEAA187DC5E149F4E8E44492D999358
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....."b...........!.........x.......P.......................................`.......Z....@.........................PR.......Q..d....0..0............}......D........................................................Q..8.................................... .......t..................@..@.rsrc.... ...0.......v..............@..@petite.......P.......z..............`..`......................p..k..K..i{..\.H..'.|w.t...\..dkB%..i.cX...`*B...m.X..A.NU.i.I. J.I....x-.e2n.IA.2.:..2G5Z/.+(8w.S<...`ML........!..%+.r.s.1.~.D...]......U..q3.....9..?y.>j.E.T...Y..D..>..aJ......P^Y..w?.9w.,...+C^.[....|..'.....7..F%..A.....)..b.)8.2Q`.v.F=.."S*..{z...z-H=....L_....RM..s......H2P1a....[..i. 2..~.?...+R... .m(.I..X...H.g.Z..i..G.?.(......e.:.B......fh......gl.x.Z......I>..#....Hgv.;g.@ l.$(...0.........l.>.p..z;A.@...*4v..x.U.gU..Bqqb..6.x...D.....cIE(5m.g}J..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):18966
                                                                                      Entropy (8bit):7.620111275837424
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:gOKwxnw6OVDU839fgRgFMkucNauTT80CyTIz2bGjqXOK0Jo:gOHwBDUOe2McQkI0Cyo2Q/o
                                                                                      MD5:F0F973781B6A66ADF354B04A36C5E944
                                                                                      SHA1:8E8EE3A18D4CEC163AF8756E1644DF41C747EDC7
                                                                                      SHA-256:04AB613C895B35044AF8A9A98A372A5769C80245CC9D6BF710A94C5BC42FA1B3
                                                                                      SHA-512:118D5DACC2379913B725BD338F8445016F5A0D1987283B082D37C1D1C76200240E8C79660E980F05E13E4EB79BDA02256EAC52385DAA557C6E0C5D326D43A835
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L...9#.]...........!.........B...............p............................................@.....................................x.......@....................M..........................................................@............................................>..................@..@.rsrc................@..............@..@.......................................@petite...............D..............`..`....................................g5 ....S%,_ .]/.0$R.yB..."@...N.AGG.^.?...1.........&?....v....6.0.. ME..(..gh\jv#.l..#$.Z&...._\`.@.......D.;.C~..m}3..\>.h..@.;.f Tho...(xVs..m.c..F..SS.C...z[....z...... .X.&....HY,...o.d..jP.nr..@.)..W.1#...b..Q.*E8.B..N5.....].........7..A..2c.M.q.O0(.Gi..B.....CT.(..+....>@T j.#!..."..P.u.3..5.Q0K..p....ERvG..._'...ir%m...NT.v:.....g.....8.+....m....8..Z.=.B.......D_..ln...C.......p8...e."...U...+.f..E.=X.j.DeD.X_.Y..n.r.!xWu..\.VB.......`.F.A....dx...
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):8456
                                                                                      Entropy (8bit):6.767152008521429
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:yxPHUtfhriUVoSoGtyo2xmJ8GbarAtT7/lxjFZnPK0cl:KPehriU3t2IiGbHTxZnPK0cl
                                                                                      MD5:19E08B7F7B379A9D1F370E2B5CC622BD
                                                                                      SHA1:3E2D2767459A92B557380C5796190DB15EC8A6EA
                                                                                      SHA-256:AC97E5492A3CE1689A2B3C25D588FAC68DFF5C2B79FCF4067F2D781F092BA2A1
                                                                                      SHA-512:564101A9428A053AA5B08E84586BCBB73874131154010A601FCE8A6FC8C4850C614B4B0A07ACF2A38FD2D4924D835584DB0A8B49EF369E2E450E458AC32CF256
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L...#.MZ...........!.................p.......0............................................@.........................Pr.......q..d....P..8....................%.......................................................q..8....................................@..........................@..@.rsrc........P......................@..@.............`.........................@petite.......p......................`..`..................................................l..a.......1...3W..Z.....H...5.(...$.. .>X9..Fn... ..."j1..........%.7.d...".m...n.ePY......`....I.gYo..UC....Rq(...F......s..8`.I.....i..F.....'......@..-;.........J...Oq...b@...........$.D4E..($.....8':*;.q....[-..{..w....@M....J$..0d..9Q.I^.^y.E..*L_-.x!s.......W.H.R..@.6....MQ.Q8.s.."...!."IX.vM...!e.$%......U.....F.CoI..X.dA...0.Y..r.8.*p...<..M y...8..s....N5<.J....&..`...w..'..\s..%..A.`....s..j.H...X#..R.\..)R3@..X.P.5...G..t.f/..C.b.d...|.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):36752
                                                                                      Entropy (8bit):7.780431937344781
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:E7epCl6I8YbTvEKXQ2vm+iocmmMt7KjuDnlVahRlmftuY5B:EepUv8aZvmd+7nDDalauy
                                                                                      MD5:9FF783BB73F8868FA6599CDE65ED21D7
                                                                                      SHA1:F515F91D62D36DC64ADAA06FA0EF6CF769376BDF
                                                                                      SHA-256:E0234AF5F71592C472439536E710BA8105D62DFA68722965DF87FED50BAB1816
                                                                                      SHA-512:C9D3C3502601026B6D55A91C583E0BB607BFC695409B984C0561D0CBE7D4F8BD231BC614E0EC1621C287BF0F207017D3E041694320E692FF00BC2220BFA26C26
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b...........!.........n.......................................................B....@.........................P...........d.......@............s.......x..........................................................8............................................j..................@..@.rsrc.... ...........l..............@..@petite...............p..............`..`..................8..u...I.x|}...g{...@..ffe.c4.-.Bj..........U.J.`..s.N:`..I@;..B.kbmj..E%2. `....".]&.&.).BB...E..4u'.....Q.......%....V.............5...y....E..q<w.....j...B..O...p....*.X...m...= .X..........4........~~.8.F@.V...6....;?.5..)S.m.9U......^.zO!1o.F.E. ...H=`2...9.(...4).E.!G..;R.1.#.h0..(*..t8..O...Td.d..~...l.a..U...b<../..W....M6...U*G..II.x........>..I[...v.N/.V..3..Y.c...Zh.i..i.....n....M..D....5o."....(.9.+..z...._$t.T...X#\...N....Q%...>U..|....J
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):36416
                                                                                      Entropy (8bit):7.842278356440954
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:lshkyPXvH6bPACtmb8boNQdVfCXewki/OvXEApOqmFfSq1oIQMW:lsh3n5Pb8boOdVCuwNEXEAonfSq1JQb
                                                                                      MD5:BEBA64522AA8265751187E38D1FC0653
                                                                                      SHA1:63FFB566AA7B2242FCC91A67E0EDA940C4596E8E
                                                                                      SHA-256:8C58BC6C89772D0CD72C61E6CF982A3F51DEE9AAC946E076A0273CD3AAF3BE9D
                                                                                      SHA-512:13214E191C6D94DB914835577C048ADF2240C7335C0A2C2274C096114B7B75CD2CE13A76316963CCD55EE371631998FAC678FCF82AE2AE178B7813B2C35C6651
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....}.Q...........!................6 ............`..........................0......................................d#.......!..........@...................t...........................................................................................................................`....rsrc...........@...................@..@....................................@................ ......................`.......................................X...{.......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!... c.f.`P....h.p..j..P..C.h..`..<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I.....................]...............'..................................A...%...........
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):19008
                                                                                      Entropy (8bit):7.672481244971812
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:dz7otnjFa4ECX3yeGjA+tSXGnUav92hca+XWRlsuG+is:po7GU+szS3W7sQ7
                                                                                      MD5:8EE91149989D50DFCF9DAD00DF87C9B0
                                                                                      SHA1:E5581E6C1334A78E493539F8EA1CE585C9FFAF89
                                                                                      SHA-256:3030E22F4A854E11A8AA2128991E4867CA1DF33BC7B9AFF76A5E6DEEF56927F6
                                                                                      SHA-512:FA04E8524DA444DD91E4BD682CC9ADEE445259E0C6190A7DEF82B8C4478A78AAA8049337079AD01F7984DBA28316D72445A0F0D876F268A062AD9B8FF2A6E58D
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....+vS...........!....6...6.......6........p......................................................................0..........P.......@...................tM.......................................................................................................>..................`....rsrc...........@....H..............@..@....................................@...........6...........................`.......................................D...n'......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!......f.`P....h.5..j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X............f.......Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I..K..........(...|...}K...................E..K....p..j...g........Q..........y...........
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):68876
                                                                                      Entropy (8bit):7.922125376804506
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:q0Z4sz1ZMjCjDIhoLffiedENahBzzxO/JfgmYFGKEvi8TxCI+vHVl:v4MzMjGkhoLfsahS/JYN2vUl
                                                                                      MD5:4E35BA785CD3B37A3702E577510F39E3
                                                                                      SHA1:A2FD74A68BEFF732E5F3CB0835713AEA8D639902
                                                                                      SHA-256:0AFE688B6FCA94C69780F454BE65E12D616C6E6376E80C5B3835E3FA6DE3EB8A
                                                                                      SHA-512:1B839AF5B4049A20D9B8A0779FE943A4238C8FBFBF306BC6D3A27AF45C76F6C56B57B2EC8F087F7034D89B5B139E53A626A8D7316BE1374EAC28B06D23E7995D
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L.....U]...........!......................... ............................................@.........................P...........d.......@...............................................................................8...............................................................@..@.rsrc...............................@..@.......................................@petite..............................`..`...........................................&MK#H..OEJ..}??...:..$ayf.r7.w(/*.d`...A(7.%p.f.>\..d."..W......[4.0..ZY..... .....~...T....9a+..'.......g!.....l...<..?Y.(..[k.I=....D.....c.*.=.?.8...D>0...#.ZdO..Z...%......X.P..bS..s..=$...m.N........A......A4..J>Wa.N..K.>....2n8.ii.#....y#.J ....i!...a7..Pbl@B.%h0..8RSr.........]..z.\...x..e..5.3.$h. <G.3....-......Q....O0..,......Y}......@...<...t.H).T..! .....ap......Tj.o...0b...`..yX.. g...hzA...b.7.s$M.... ..'....\$...H.\.l.C g..4..(.6@.Q....B(..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):17472
                                                                                      Entropy (8bit):7.524548435291935
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:IwwsQD13cT5HhSVeEQNW5kbbcGEh/qTio+lyTnGy:QRD13ySVeEOW5kbSSTHNTnr
                                                                                      MD5:7B52BE6D702AA590DB57A0E135F81C45
                                                                                      SHA1:518FB84C77E547DD73C335D2090A35537111F837
                                                                                      SHA-256:9B5A8B323D2D1209A5696EAF521669886F028CE1ECDBB49D1610C09A22746330
                                                                                      SHA-512:79C1959A689BDC29B63CA771F7E1AB6FF960552CADF0644A7C25C31775FE3458884821A0130B1BAB425C3B41F1C680D4776DD5311CE3939775A39143C873A6FE
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....^.L...........!....%v..%.......6........`......................................................................h..................@....................F...............................................................................................p.......8..................`....rsrc...........@....B..............@..@....................................@...........%...........................`.......................................X...x..0....j...f.!.PRj.....j..S.ERROR!.Corrupt Data!......f.`P....h.,..j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I..D..%...........|...CC.......p......n....<.......`..............lH......)...............
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):35588
                                                                                      Entropy (8bit):7.817557274117395
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:dCrMZHv56WRldhmLjQDrbfc8cznHvc6modHQ:sAR0LzHvc6m2HQ
                                                                                      MD5:58521D1AC2C588B85642354F6C0C7812
                                                                                      SHA1:5912D2507F78C18D5DC567B2FA8D5AE305345972
                                                                                      SHA-256:452EEE1E4EF2FE2E00060113CCE206E90986E2807BB966019AC4E9DEB303A9BD
                                                                                      SHA-512:3988B61F6B633718DE36C0669101E438E70A17E3962A5C3A519BDECC3942201BA9C3B3F94515898BB2F8354338BA202A801B22129FC6D56598103B13364748C1
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L.....yX...........!.................@.......................................P............@.........................PB.......A..d.... ..@...................P........................................................A..8...............................................................@..@.rsrc........ ......................@..@.............0.........................@petite.......@......................`..`...................................._3.....g.ge..7t...R-_.R.@c.S.\..J?L.EZ.,....=H8..;.QJ.....P-)eFs93:.^...f......}..?...e...SD.......-.u.......q2...P...6..z5.T.S..P..Q....@..Mq.>....8" F...,..FE...S.[U..c......jr....b...-%...`......w..+W.C......]..#......LS....W.Y....o.8...i.[)..%(.2.t...YY .bL.....b.@&J,?l.........$..F..&...a#.\[".^...&]co....K.>...xQzw..XW.uT..+dm.o.b...@c....3..r....@]...P........{C/.....A!.&..........'....._..."S..&..F.......:.dxtK.6...7.I...Q..Nm2.....NX..fG..L..7.?..".(
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:Unicode text, UTF-8 text
                                                                                      Category:dropped
                                                                                      Size (bytes):1059
                                                                                      Entropy (8bit):5.1208137218866945
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:LLDrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:LLDaJHlxE35QHOs5exm3ogF5n
                                                                                      MD5:B7EDCC6CB01ACE25EBD2555CF15473DC
                                                                                      SHA1:2627FF03833F74ED51A7F43C55D30B249B6A0707
                                                                                      SHA-256:D6B4754BB67BDD08B97D5D11B2D7434997A371585A78FE77007149DF3AF8D09C
                                                                                      SHA-512:962BD5C9FB510D57FAC0C3B189B7ADEB29E00BED60F0BB9D7E899601C06C2263EDA976E64C352E4B7C0AAEFB70D2FCB0ABEF45E43882089477881A303EB88C09
                                                                                      Malicious:false
                                                                                      Preview:Copyright (c) 2011 Jan Kokem.ller..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONNECTION WITH
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):16910
                                                                                      Entropy (8bit):5.289608933932413
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:ohtyjknGC7hipL+9mLYFOozxkdlDNUwS5Qq:UGknGC74l+MUFI7C
                                                                                      MD5:2F040608E68E679DD42B7D8D3FCA563E
                                                                                      SHA1:4B2C3A6B8902E32CDA33A241B24A79BE380C55FC
                                                                                      SHA-256:6B980CADC3E7047CC51AD1234CB7E76FF520149A746CB64E5631AF1EA1939962
                                                                                      SHA-512:718AF5BE259973732179ABA45B672637FCA21AE575B4115A62139A751C04F267F355B8F7F7432B56719D91390DABA774B39283CBCFE18F09CA033389FB31A4FC
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........B.........#.........>...f...........0.....h......................... ................ .........................{.......|...............................$...........................pA.......................................................text...4...........................`.P`.data...<....0......."..............@.0..rdata.......@.......$..............@.`@/4...........P.......(..............@.0@.bss.....d...`........................`..edata..{............2..............@.0@.idata..|............4..............@.0..CRT....,............:..............@.0..tls.................<..............@.0..reloc..$............>..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):15374
                                                                                      Entropy (8bit):5.192037544202194
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:lhgkOI7BGi9gKV6uq+u6JewsNhNXUwSCgQ:DT7BGVKPKbXF
                                                                                      MD5:BEFD36FE8383549246E1FD49DB270C07
                                                                                      SHA1:1EF12B568599F31292879A8581F6CD0279F3E92A
                                                                                      SHA-256:B5942E8096C95118C425B30CEC8838904897CDEF78297C7BBB96D7E2D45EE288
                                                                                      SHA-512:FD9AA6A4134858A715BE846841827196382D0D86F2B1AA5C7A249B770408815B0FE30C4D1E634E8D6D3C8FEDBCE4654CD5DC240F91D54FC8A7EFE7CAE2E569F4
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........<.........#.........8...............0.....f................................b......... ......................p..E.......h...........................................................P@......................................................text...............................`.P`.data...,....0....... ..............@.0..rdata.......@......."..............@.0@/4...........P.......$..............@.0@.bss.........`........................`..edata..E....p......................@.0@.idata..h............0..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):197646
                                                                                      Entropy (8bit):6.1570532273946625
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:brPGp0y4SP+iBGgySYm+dE3sYrJqkAzhU88vsAGSW+:brPGaTEsHSYmbbOU8osAGG
                                                                                      MD5:2C8EC61630F8AA6AAC674E4C63F4C973
                                                                                      SHA1:64E3BB9AA505C66E87FE912D4EA3054ADF6CEF76
                                                                                      SHA-256:DFD55D0DDD1A7D081FCE8E552DC29706A84DC6CA2FDD2F82D63F33D74E882849
                                                                                      SHA-512:488378012FB5F477ED4636C37D7A883B1DAD0FBC671D238B577A9374EFE40AB781F5E483AE921F1909A9B7C1C2A3E78E29B533D3B6FFE15AAEE840CAD2DCF5D0
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...............................m................................]_........ ...................... ..A....0...............................`..............................p0.......................1..D............................text...............................`.P`.data...............................@.0..rdata..L0.......2..................@.`@/4...........P......................@.0@.bss..................................`..edata..A.... ......................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.........P......................@.0..reloc.......`......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):31936
                                                                                      Entropy (8bit):6.6461204214578
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:SEEn30ilOAb++HynTDbc3fwaVCPxWE/MM:SEa0YOU1HgU3fwaVCPxqM
                                                                                      MD5:72E3BDD0CE0AF6A3A3C82F3AE6426814
                                                                                      SHA1:A2FB64D5B9F5F3181D1A622D918262CE2F9A7AA3
                                                                                      SHA-256:7AC8A8D5679C96D14C15E6DBC6C72C260AAEFB002D0A4B5D28B3A5C2B15DF0AB
                                                                                      SHA-512:A876D0872BFBF099101F7F042AEAF1FD44208A354E64FC18BAB496BEEC6FDABCA432A852795CFC0A220013F619F13281B93ECC46160763AC7018AD97E8CC7971
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........P.........#.....&...L...............@.....d................................8......... .........................b............................P...,...................................R......................x................................text....%.......&..................`.P`.data........@.......*..............@.`..rdata.......P.......,..............@.0@/4...........`.......2..............@.0@.bss.........p........................`..edata..b............>..............@.0@.idata...............@..............@.0..CRT....,............H..............@.0..tls.................J..............@.0..reloc...............L..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):197120
                                                                                      Entropy (8bit):6.423554884287906
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:X+dMKihenEUunaA+mVMISPCG5vHglwiaJVZkRyAHeOdrQpCklkHy+axeY0R2JdXs:MagxOOZWP2dC28d+y2e
                                                                                      MD5:67247C0ACA089BDE943F802BFBA8752C
                                                                                      SHA1:508DA6E0CF31A245D27772C70FFA9A2AE54930A3
                                                                                      SHA-256:BAB8D388EA3AF1AABB61B8884CFAA7276A2BFD77789856DD610480C55E4D0A60
                                                                                      SHA-512:C4A690A53581D3E4304188FD772C6F1DA1C72ED2237A13951ACE8879D1986423813A6F7534FF506790CB81633CEB7FF6A6239C1F852725FBACA4B40D9AE3F2DB
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d,.. M.. M.. M..4&..-M..4&...M..4&..3M..r8...M..r8../M..r8..1M..4&..#M.. M.._M..v8..$M..v8..!M..v8..!M..v8..!M..Rich M..........PE..L... ..a...........!.........................................................@............@.........................@...p.......(............................ ..(...P...8...............................@...............H............................text...>........................... ..`.rdata..d...........................@..@.data...H...........................@....rsrc...............................@..@.reloc..(.... ......................@..B........................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):115712
                                                                                      Entropy (8bit):6.401537154757194
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:rY4gILp0Vt7BMkvfHutO+eP0ZjflQf5xqkYXeo21sb2rqG70:rY4gILp0Vt77nLBCtQfjqv8qG70
                                                                                      MD5:840D631DA54C308B23590AD6366EBA77
                                                                                      SHA1:5ED0928667451239E62E6A0A744DA47C74E1CF89
                                                                                      SHA-256:6BAD60DF9A560FB7D6F8647B75C367FDA232BDFCA2291273A21179495DAC3DB9
                                                                                      SHA-512:1394A48240BA4EF386215942465BDE418C5C6ED73FC935FE7D207D2A1370155C94CDC15431985ED4E656CA6B777BA79FFC88E78FA3D99DB7E0E6EAC7D1663594
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?..R{...{...{...o...q...o.......o...i...)...W...)...t...)...j...o...x...{.......-...s...-...z...-.4.z...-...z...Rich{...........PE..L....H.a...........!.....$...........h.......@............................... ............@.............................x.......(.......................................8..............................@............@..D............................text....#.......$.................. ..`.rdata...x...@...z...(..............@..@.data.... ..........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):62478
                                                                                      Entropy (8bit):6.063363187934607
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:q3s6+NMpjqudP/XB9rGCWLEc6wY3U0LvDcb0wGNPdqdRJy/5f4mdajO42iySAqB:q8zNM1nBId/ce7GNP6m/5AQGySAs
                                                                                      MD5:940EEBDB301CB64C7EA2E7FA0646DAA3
                                                                                      SHA1:0347F029DA33C30BBF3FB067A634B49E8C89FEC2
                                                                                      SHA-256:B0B56F11549CE55B4DC6F94ECBA84AEEDBA4300D92F4DC8F43C3C9EEEFCBE3C5
                                                                                      SHA-512:50D455C16076C0738FB1FECAE7705E2C9757DF5961D74B7155D7DFB3FAB671F964C73F919CC749D100F6A90A3454BFF0D15ED245A7D26ABCAA5E0FDE3DC958FD
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...............................k.........................`................ .........................r.......D............................P..|.......................................................\............................text...............................`.P`.data...0...........................@.0..rdata..8...........................@.`@/4......L...........................@.0@.bss..................................`..edata..r...........................@.0@.idata..D...........................@.0..CRT....,....0......................@.0..tls.........@......................@.0..reloc..|....P......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):26126
                                                                                      Entropy (8bit):6.048294343792499
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:hhkxE9v7/GRm4v5OxlBWaEybb9p7aCyS/hU7CateHcUwSCnq6D:Yx6jGXvc5WaBb99yS/hQh
                                                                                      MD5:D1223F86EDF0D5A2D32F1E2AAAF8AE3F
                                                                                      SHA1:C286CA29826A138F3E01A3D654B2F15E21DBE445
                                                                                      SHA-256:E0E11A058C4B0ADD3892E0BEA204F6F60A47AFC86A21076036393607235B469C
                                                                                      SHA-512:7EA1FFB23F8A850F5D3893C6BB66BF95FAB2F10F236A781620E9DC6026F175AAE824FD0E03082F0CF13D05D13A8EEDE4F5067491945FCA82BBCDCF68A0109CFF
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........f.........#.....6...b...............P.....h................................8-........ .........................i...................................................................Lk......................................................text....4.......6..................`.P`.data...,....P.......:..............@.0..rdata.......`.......<..............@.`@/4......T....p.......J..............@.0@.bss..................................`..edata..i............V..............@.0@.idata...............X..............@.0..CRT....,............^..............@.0..tls.................`..............@.0..reloc...............b..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):562190
                                                                                      Entropy (8bit):6.388293171196564
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:uCtwsqIfrUmUBrusLdVAjA1ATAtuQ8T2Q8TOksqHOuCHWoEuEc4XEmEVEEAcIHAj:uqiIoYmOuNNQ1zU/xGl
                                                                                      MD5:713D04E7396D3A4EFF6BF8BA8B9CB2CD
                                                                                      SHA1:D824F373C219B33988CFA3D4A53E7C2BFA096870
                                                                                      SHA-256:00FB8E819FFDD2C246F0E6C8C3767A08E704812C6443C8D657DFB388AEB27CF9
                                                                                      SHA-512:30311238EF1EE3B97DF92084323A54764D79DED62BFEB12757F4C14F709EB2DBDF6625C260FB47DA2D600E015750394AA914FC0CC40978BA494D860710F9DC40
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Rd...............(..........................@.......................................@... .................................H...........................................................D...........................l............................text...T...........................`..`.data...X...........................@....rdata..H...........................@..@/4......P...........................@..@.bss....t................................idata..H............d..............@....CRT....0............n..............@....tls.................p..............@....rsrc................r..............@....reloc...............x..............@..B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):115712
                                                                                      Entropy (8bit):6.401537154757194
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:rY4gILp0Vt7BMkvfHutO+eP0ZjflQf5xqkYXeo21sb2rqG70:rY4gILp0Vt77nLBCtQfjqv8qG70
                                                                                      MD5:840D631DA54C308B23590AD6366EBA77
                                                                                      SHA1:5ED0928667451239E62E6A0A744DA47C74E1CF89
                                                                                      SHA-256:6BAD60DF9A560FB7D6F8647B75C367FDA232BDFCA2291273A21179495DAC3DB9
                                                                                      SHA-512:1394A48240BA4EF386215942465BDE418C5C6ED73FC935FE7D207D2A1370155C94CDC15431985ED4E656CA6B777BA79FFC88E78FA3D99DB7E0E6EAC7D1663594
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?..R{...{...{...o...q...o.......o...i...)...W...)...t...)...j...o...x...{.......-...s...-...z...-.4.z...-...z...Rich{...........PE..L....H.a...........!.....$...........h.......@............................... ............@.............................x.......(.......................................8..............................@............@..D............................text....#.......$.................. ..`.rdata...x...@...z...(..............@..@.data.... ..........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):34392
                                                                                      Entropy (8bit):7.81689943223162
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:mYBs3O9YL558R6R8P8W2rjQZQtfTIxRYsetoPNvPWIl+syr:vsUY15mqzW2u8rIxisFcJr
                                                                                      MD5:EA245B00B9D27EF2BD96548A50A9CC2C
                                                                                      SHA1:8463FDCDD5CED10C519EE0B406408AE55368E094
                                                                                      SHA-256:4824A06B819CBE49C485D68A9802D9DAE3E3C54D4C2D8B706C8A87B56CEEFBF3
                                                                                      SHA-512:EF1E107571402925AB5B1D9B096D7CEFF39C1245A23692A3976164D0DE0314F726CCA0CB10246FE58A13618FD5629A92025628373B3264153FC1D79B0415D9A7
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ph..4...4...4.......0...[...0...[...6...4.......V...0...`*..........5....)......Rich4...........................PE..L.....T...........!................6 .......................................0......................................D#..y....!..d.......X............................................................................................................................z..................`....rsrc...........X...................@..@....................................`...petite....... ......................`...................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):5960
                                                                                      Entropy (8bit):5.956401374574174
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:dj78cqhzbWKlECE7WbjDFf6IhaYYUOAoDf4+XCVhovG9AkM7Ui10:CjlEJ7WbjDFf6waYvdc4gYAkM10
                                                                                      MD5:B3CC560AC7A5D1D266CB54E9A5A4767E
                                                                                      SHA1:E169E924405C2114022674256AFC28FE493FBFDF
                                                                                      SHA-256:EDDE733A8D2CA65C8B4865525290E55B703530C954F001E68D1B76B2A54EDCB5
                                                                                      SHA-512:A836DECACB42CC3F7D42E2BF7A482AE066F5D1DF08CCCC466880391028059516847E1BF71E4C6A90D2D34016519D16981DDEEACFB94E166E4A9A720D9CC5D699
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L......I...........!.....4...T......6`....... ...............................p......................................lc.......a.......@..H....................................................................................................................0..........................`....rsrc........@..H...................@..@.............P......................@................`......................`.......................................X....E......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!...`..f.`P....h....j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I.e...h....P..0................0..............h.... ..0...........6...........k...........
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):36416
                                                                                      Entropy (8bit):7.842278356440954
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:lshkyPXvH6bPACtmb8boNQdVfCXewki/OvXEApOqmFfSq1oIQMW:lsh3n5Pb8boOdVCuwNEXEAonfSq1JQb
                                                                                      MD5:BEBA64522AA8265751187E38D1FC0653
                                                                                      SHA1:63FFB566AA7B2242FCC91A67E0EDA940C4596E8E
                                                                                      SHA-256:8C58BC6C89772D0CD72C61E6CF982A3F51DEE9AAC946E076A0273CD3AAF3BE9D
                                                                                      SHA-512:13214E191C6D94DB914835577C048ADF2240C7335C0A2C2274C096114B7B75CD2CE13A76316963CCD55EE371631998FAC678FCF82AE2AE178B7813B2C35C6651
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....}.Q...........!................6 ............`..........................0......................................d#.......!..........@...................t...........................................................................................................................`....rsrc...........@...................@..@....................................@................ ......................`.......................................X...{.......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!... c.f.`P....h.p..j..P..C.h..`..<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I.....................]...............'..................................A...%...........
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):127669
                                                                                      Entropy (8bit):7.952352167575405
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:kdGUCKL7Wn/OzU2ThapTv773+HMnBasgGlBM:dn/mU8K/3EgNgoM
                                                                                      MD5:75C1D7A3BDF1A309C540B998901A35A7
                                                                                      SHA1:B06FEEAC73D496C435C66B9B7FF7514CBE768D84
                                                                                      SHA-256:6303F205127C3B16D9CF1BDF4617C96109A03C5F2669341FBC0E1D37CD776B29
                                                                                      SHA-512:8D2BBB7A7AD34529117C8D5A122F4DAF38EA684AACD09D5AD0051FA41264F91FD5D86679A57913E5ADA917F94A5EF693C39EBD8B465D7E69EF5D53EF941AD2EE
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-41K4U.tmp, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....O?\...........!.................`.......................................p............@..........................b.......a.......0..@...........................................................................<b..H.................................... ..........................@..@.rsrc........0......................@..@......... ...@.........................@petite.......`......................`..`..........................................fE...nj.:<...n...1..}..r..". .S(...#!............7..5.Q..0..}.. .....^y...U...@..3.........&.lp(.pt.a......!..`@C.O3G7..."\..w.1u.$4..1h...M...K6.L...L..~.w...b2x-.......9k".....".V\............o..................qO&.......4(."0.Zy....2..Y..Z..:2.XM..D....a&..&.L,......./+......c<...^.2.x0..H.618....Q.Q.5.%...Z1.I.......a...q-}.0..D....o.!.....O.......B....# O.!....cY5.#...n.`..1...r!.)].:...m.f.....x....N"t.j..l.....:/...,.v........8F.N...X..j.R......"...&...
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):123406
                                                                                      Entropy (8bit):6.263889638223575
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:hnPkU1t2P2hHV5JG1YBBAUBEd8+poyez9djcx2/8s6UJqfxX+1XOAhbKzb3+d:xPu21IYyCTToE6c+6e+d
                                                                                      MD5:B49ECFA819479C3DCD97FAE2A8AB6EC6
                                                                                      SHA1:1B8D47D4125028BBB025AAFCA1759DEB3FC0C298
                                                                                      SHA-256:B9D5317E10E49AA9AD8AD738EEBE9ACD360CC5B20E2617E5C0C43740B95FC0F2
                                                                                      SHA-512:18617E57A76EFF6D95A1ED735CE8D5B752F1FB550045FBBEDAC4E8E67062ACD7845ADC6FBE62238C383CED5E01D7AA4AB8F968DC442B67D62D2ED712DB67DC13
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........................R.......d>..........p....@...........................@......^........ ...............................@.4...................................................................................|.@.@............................text....Q.......R..................`.P`.data...\....p.......V..............@.@..rdata...a.......b...X..............@.`@/4..................................@.0@.bss.....c>...........................`..idata..4.....@.....................@.0..CRT....4.....@.....................@.0..tls..........@.....................@.0.................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):394752
                                                                                      Entropy (8bit):6.662070316214798
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:uAlmRfeS+mOxv8bgDTuXU54l8WybBE36IpuIT9nxQPQnhH/a0CRdWqWJwGKp:zlm0S+SEuXU54NylJIJ9KPQnhilRsVJ
                                                                                      MD5:A4123DE65270C91849FFEB8515A864C4
                                                                                      SHA1:93971C6BB25F3F4D54D4DF6C0C002199A2F84525
                                                                                      SHA-256:43A9928D6604BF604E43C2E1BAB30AE1654B3C26E66475F9488A95D89A4E6113
                                                                                      SHA-512:D0834F7DB31ABA8AA9D97479938DA2D4CD945F76DC2203D60D24C75D29D36E635C2B0D97425027C4DEBA558B8A41A77E288F73263FA9ABC12C54E93510E3D384
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......KL...-d..-d..-d..U...-d..Be..-d.TEe..-d..-e.:-d..Ba..-d..B`..-d..Bg..-d..B`.c-d..Bd..-d..B...-d..Bf..-d.Rich.-d.........................PE..L.....b`...........!.....L..........+S.......`...............................P............@.................................L........... .................... ..\ ..$...............................@...@............`...............................text...NK.......L.................. ..`.rdata......`.......P..............@..@.data...............................@....rsrc... ...........................@..@.reloc..\ ... ..."..................@..B................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):227328
                                                                                      Entropy (8bit):6.641153481093122
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:jtJXnqDMJgH50aKyumLCGTrS4ifbjoO88k:KqgHlKyumLCGTrS4inoZ
                                                                                      MD5:BC824DC1D1417DE0A0E47A30A51428FD
                                                                                      SHA1:C909C48C625488508026C57D1ED75A4AE6A7F9DB
                                                                                      SHA-256:A87AA800F996902F06C735EA44F4F1E47F03274FE714A193C9E13C5D47230FAB
                                                                                      SHA-512:566B5D5DDEA920A31E0FB9E048E28EF2AC149EF075DB44542A46671380F904427AC9A6F59FBC09FE3A4FBB2994F3CAEEE65452FE55804E403CEABC091FFAF670
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...e>.a...........#.........t...V.................e.........................@......1......... .........................#....................................0...............................).......................................................text...............................`.P`.data...............................@.`..rdata..d0.......2..................@.`@.eh_framd@...@...B..................@.0@.bss.....T............................`..edata..#............T..............@.0@.idata...............^..............@.0..CRT....,............d..............@.0..tls......... .......f..............@.0..reloc.......0.......h..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):772608
                                                                                      Entropy (8bit):6.546391052615969
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:Q75mFL0MNnM/SQdtij4UujFhGiNV1SckT3wio2L2jV6EfnQ29mwF3s4iGtInw1m8:AwN0e0lN1fnQUFccGns9ukS6
                                                                                      MD5:B3B487FC3832B607A853211E8AC42CAD
                                                                                      SHA1:06E32C28103D33DAD53BE06C894203F8808D38C1
                                                                                      SHA-256:30BC10BD6E5B2DB1ACE93C2004E24C128D20C242063D4F0889FD3FB3E284A9E4
                                                                                      SHA-512:FA6BDBA4F2A0CF4CCA40A333B69FD041D9EDC0736EDA206F17F10AF5505CC4688B0401A3CAD2D2F69392E752B8877DB593C7872BCDB133DC785A200FF38598BB
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....1.d.................D..........$].......`....@.......................................@......@...................0..o............p...(...................`...............................P......................X........ .......................text...h4.......6.................. ..`.itext.......P.......:.............. ..`.data....7...`...8...H..............@....bss....0i...............................idata..............................@....didata...... ......................@....edata..o....0......................@..@.tls.........@...........................rdata..]....P......................@..@.reloc.......`......................@..B.rsrc....(...p...(..................@..@....................................@..@................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):19008
                                                                                      Entropy (8bit):7.672481244971812
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:dz7otnjFa4ECX3yeGjA+tSXGnUav92hca+XWRlsuG+is:po7GU+szS3W7sQ7
                                                                                      MD5:8EE91149989D50DFCF9DAD00DF87C9B0
                                                                                      SHA1:E5581E6C1334A78E493539F8EA1CE585C9FFAF89
                                                                                      SHA-256:3030E22F4A854E11A8AA2128991E4867CA1DF33BC7B9AFF76A5E6DEEF56927F6
                                                                                      SHA-512:FA04E8524DA444DD91E4BD682CC9ADEE445259E0C6190A7DEF82B8C4478A78AAA8049337079AD01F7984DBA28316D72445A0F0D876F268A062AD9B8FF2A6E58D
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....+vS...........!....6...6.......6........p......................................................................0..........P.......@...................tM.......................................................................................................>..................`....rsrc...........@....H..............@..@....................................@...........6...........................`.......................................D...n'......j...f.!.PRj.....j..S.ERROR!.Corrupt Data!......f.`P....h.5..j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X............f.......Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I..K..........(...|...}K...................E..K....p..j...g........Q..........y...........
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):337408
                                                                                      Entropy (8bit):6.515131904432587
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:3nzsyDn7PDS+FDflUjvJUkbEOyF1rOpsuCOuOff5k4F/lTRHA:3377SKfgvqkbFyFJCRRzH
                                                                                      MD5:62D2156E3CA8387964F7AA13DD1CCD5B
                                                                                      SHA1:A5067E046ED9EA5512C94D1D17C394D6CF89CCCA
                                                                                      SHA-256:59CBFBA941D3AC0238219DAA11C93969489B40F1E8B38FABDB5805AC3DD72BFA
                                                                                      SHA-512:006F7C46021F339B6CBF9F0B80CFFA74ABB8D48E12986266D069738C4E6BDB799BFBA4B8EE4565A01E90DBE679A96A2399D795A6EAD6EACBB4818A155858BF60
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@..|...|...|...p...|...w...|.d.r...|...v...|...x...|.i.#...|...}.|.|.d.!...|...w...|..V....|...v...|.......|. .z...|.Rich..|.........PE..L....r.b.....................>......\........ ....@.......................................@.....................................x....0.......................@...3................................................... ..(............................text............................... ..`.rdata..r.... ......................@..@.data....'..........................@....sxdata...... ......................@....rsrc........0......................@..@.reloc...<...@...>..................@..B........................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):197646
                                                                                      Entropy (8bit):6.1570532273946625
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:brPGp0y4SP+iBGgySYm+dE3sYrJqkAzhU88vsAGSW+:brPGaTEsHSYmbbOU8osAGG
                                                                                      MD5:2C8EC61630F8AA6AAC674E4C63F4C973
                                                                                      SHA1:64E3BB9AA505C66E87FE912D4EA3054ADF6CEF76
                                                                                      SHA-256:DFD55D0DDD1A7D081FCE8E552DC29706A84DC6CA2FDD2F82D63F33D74E882849
                                                                                      SHA-512:488378012FB5F477ED4636C37D7A883B1DAD0FBC671D238B577A9374EFE40AB781F5E483AE921F1909A9B7C1C2A3E78E29B533D3B6FFE15AAEE840CAD2DCF5D0
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...............................m................................]_........ ...................... ..A....0...............................`..............................p0.......................1..D............................text...............................`.P`.data...............................@.0..rdata..L0.......2..................@.`@/4...........P......................@.0@.bss..................................`..edata..A.... ......................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.........P......................@.0..reloc.......`......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):17472
                                                                                      Entropy (8bit):7.524548435291935
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:IwwsQD13cT5HhSVeEQNW5kbbcGEh/qTio+lyTnGy:QRD13ySVeEOW5kbSSTHNTnr
                                                                                      MD5:7B52BE6D702AA590DB57A0E135F81C45
                                                                                      SHA1:518FB84C77E547DD73C335D2090A35537111F837
                                                                                      SHA-256:9B5A8B323D2D1209A5696EAF521669886F028CE1ECDBB49D1610C09A22746330
                                                                                      SHA-512:79C1959A689BDC29B63CA771F7E1AB6FF960552CADF0644A7C25C31775FE3458884821A0130B1BAB425C3B41F1C680D4776DD5311CE3939775A39143C873A6FE
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....^.L...........!....%v..%.......6........`......................................................................h..................@....................F...............................................................................................p.......8..................`....rsrc...........@....B..............@..@....................................@...........%...........................`.......................................X...x..0....j...f.!.PRj.....j..S.ERROR!.Corrupt Data!......f.`P....h.,..j..P..C.h.....<$.3f....t...;S.^......Vj.PWj.j.Vj.PW....Y.Yf..X........X....................Z...t..$.4..l$..m..J...R...z.....XXXXZt.D$...*.P(.*.....P...s.j.h`...h`.....j.h....h....j.3.3.0_.K~..[...s.3..^......s...$A."...L$..<.........;D$....;D$......$. ............u...........V+.48.^...u.........A............r..I..D..%...........|...CC.......p......n....<.......`..............lH......)...............
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):22542
                                                                                      Entropy (8bit):5.5875455203930615
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:RKAPwPQJgZd3rw0bGMtyz1fiaqmjj1nFY4j70UotV9mRyK:YPQJgZZwUGH1fJljj1+D18
                                                                                      MD5:E1C0147422B8C4DB4FC4C1AD6DD1B6EE
                                                                                      SHA1:4D10C5AD96756CBC530F3C35ADCD9E4B3F467CFA
                                                                                      SHA-256:124F210C04C12D8C6E4224E257D934838567D587E5ABAEA967CBD5F088677049
                                                                                      SHA-512:A163122DFFE729E6F1CA6EB756A776F6F01A784A488E2ACCE63AEAFA14668E8B1148BE948EB4AF4CA8C5980E85E681960B8A43C94B95DFFC72FCCEE1E170BD9A
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........X...............,...T...............@....@.......................................... .................................@...........................................................PU..........................P............................text....+.......,..................`.P`.data........@.......0..............@.`..rdata..0....P.......2..............@.0@/4...........`.......<..............@.0@.bss.........p........................`..idata..@............J..............@.0..CRT....4............T..............@.0..tls.................V..............@.0.................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):16910
                                                                                      Entropy (8bit):5.289608933932413
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:ohtyjknGC7hipL+9mLYFOozxkdlDNUwS5Qq:UGknGC74l+MUFI7C
                                                                                      MD5:2F040608E68E679DD42B7D8D3FCA563E
                                                                                      SHA1:4B2C3A6B8902E32CDA33A241B24A79BE380C55FC
                                                                                      SHA-256:6B980CADC3E7047CC51AD1234CB7E76FF520149A746CB64E5631AF1EA1939962
                                                                                      SHA-512:718AF5BE259973732179ABA45B672637FCA21AE575B4115A62139A751C04F267F355B8F7F7432B56719D91390DABA774B39283CBCFE18F09CA033389FB31A4FC
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........B.........#.........>...f...........0.....h......................... ................ .........................{.......|...............................$...........................pA.......................................................text...4...........................`.P`.data...<....0......."..............@.0..rdata.......@.......$..............@.`@/4...........P.......(..............@.0@.bss.....d...`........................`..edata..{............2..............@.0@.idata..|............4..............@.0..CRT....,............:..............@.0..tls.................<..............@.0..reloc..$............>..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):240654
                                                                                      Entropy (8bit):6.518503846592995
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:yZDfF4DjzIHBV+bUeenu+t+oSTdjpNZ7utS81qpHW4paP2L:ekjzMBVKXeuq+oSTdjpr7N8f+L
                                                                                      MD5:4F0C85351AEC4B00300451424DB4B5A4
                                                                                      SHA1:BB66D807EDE0D7D86438207EB850F50126924C9D
                                                                                      SHA-256:CC0B53969670C7275A855557EA16182C932160BC0F8543EFFC570F760AE2185E
                                                                                      SHA-512:80C84403ED47380FF75EBA50A23E565F7E5C68C7BE8C208A5A48B7FB0798FF51F3D33780C902A6F8AB0E6DB328860C071C77B93AC88CADF84FEF7DF34DE3E2DA
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....H...................`.....g.................................\........ .........................o.......\...............................t............................S.......................................................text...dF.......H..................`.P`.data...X....`.......L..............@.P..rdata.......p.......N..............@.`@/4.......<.......>...T..............@.0@.bss..................................`..edata..o...........................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls................................@.0..reloc..t...........................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):197120
                                                                                      Entropy (8bit):6.423554884287906
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:X+dMKihenEUunaA+mVMISPCG5vHglwiaJVZkRyAHeOdrQpCklkHy+axeY0R2JdXs:MagxOOZWP2dC28d+y2e
                                                                                      MD5:67247C0ACA089BDE943F802BFBA8752C
                                                                                      SHA1:508DA6E0CF31A245D27772C70FFA9A2AE54930A3
                                                                                      SHA-256:BAB8D388EA3AF1AABB61B8884CFAA7276A2BFD77789856DD610480C55E4D0A60
                                                                                      SHA-512:C4A690A53581D3E4304188FD772C6F1DA1C72ED2237A13951ACE8879D1986423813A6F7534FF506790CB81633CEB7FF6A6239C1F852725FBACA4B40D9AE3F2DB
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d,.. M.. M.. M..4&..-M..4&...M..4&..3M..r8...M..r8../M..r8..1M..4&..#M.. M.._M..v8..$M..v8..!M..v8..!M..v8..!M..Rich M..........PE..L... ..a...........!.........................................................@............@.........................@...p.......(............................ ..(...P...8...............................@...............H............................text...>........................... ..`.rdata..d...........................@..@.data...H...........................@....rsrc...............................@..@.reloc..(.... ......................@..B........................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):26126
                                                                                      Entropy (8bit):6.048294343792499
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:hhkxE9v7/GRm4v5OxlBWaEybb9p7aCyS/hU7CateHcUwSCnq6D:Yx6jGXvc5WaBb99yS/hQh
                                                                                      MD5:D1223F86EDF0D5A2D32F1E2AAAF8AE3F
                                                                                      SHA1:C286CA29826A138F3E01A3D654B2F15E21DBE445
                                                                                      SHA-256:E0E11A058C4B0ADD3892E0BEA204F6F60A47AFC86A21076036393607235B469C
                                                                                      SHA-512:7EA1FFB23F8A850F5D3893C6BB66BF95FAB2F10F236A781620E9DC6026F175AAE824FD0E03082F0CF13D05D13A8EEDE4F5067491945FCA82BBCDCF68A0109CFF
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........f.........#.....6...b...............P.....h................................8-........ .........................i...................................................................Lk......................................................text....4.......6..................`.P`.data...,....P.......:..............@.0..rdata.......`.......<..............@.`@/4......T....p.......J..............@.0@.bss..................................`..edata..i............V..............@.0@.idata...............X..............@.0..CRT....,............^..............@.0..tls.................`..............@.0..reloc...............b..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):13838
                                                                                      Entropy (8bit):5.173769974589746
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:oh3ZZBe9xz7rdz9Us5bsRuKUYDpesWAhQqCNhNXUwS7RuLH9+E:ohLBe3dz9UsikKDGZqCNhNXUwS4bcE
                                                                                      MD5:9C55B3E5ED1365E82AE9D5DA3EAEC9F2
                                                                                      SHA1:BB3D30805A84C6F0803BE549C070F21C735E10A9
                                                                                      SHA-256:D2E374DF7122C0676B4618AED537DFC8A7B5714B75D362BFBE85B38F47E3D4A4
                                                                                      SHA-512:EEFE8793309FDC801B1649661B0C17C38406A9DAA1E12959CD20344975747D470D6D9C8BE51A46279A42FE1843C254C432938981D108F4899B93CDD744B5D968
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........6.........#.........2...............0....@m.................................Z........ ......................p..J.......h............................................................@......................................................text...............................`.P`.data...,....0......................@.0..rdata.......@......................@.0@/4...........P......................@.0@.bss.........`........................`..edata..J....p.......(..............@.0@.idata..h............*..............@.0..CRT....,............0..............@.0..tls.................2..............@.0..reloc...............4..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):18966
                                                                                      Entropy (8bit):7.620111275837424
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:gOKwxnw6OVDU839fgRgFMkucNauTT80CyTIz2bGjqXOK0Jo:gOHwBDUOe2McQkI0Cyo2Q/o
                                                                                      MD5:F0F973781B6A66ADF354B04A36C5E944
                                                                                      SHA1:8E8EE3A18D4CEC163AF8756E1644DF41C747EDC7
                                                                                      SHA-256:04AB613C895B35044AF8A9A98A372A5769C80245CC9D6BF710A94C5BC42FA1B3
                                                                                      SHA-512:118D5DACC2379913B725BD338F8445016F5A0D1987283B082D37C1D1C76200240E8C79660E980F05E13E4EB79BDA02256EAC52385DAA557C6E0C5D326D43A835
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-E4V7I.tmp, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L...9#.]...........!.........B...............p............................................@.....................................x.......@....................M..........................................................@............................................>..................@..@.rsrc................@..............@..@.......................................@petite...............D..............`..`....................................g5 ....S%,_ .]/.0$R.yB..."@...N.AGG.^.?...1.........&?....v....6.0.. ME..(..gh\jv#.l..#$.Z&...._\`.@.......D.;.C~..m}3..\>.h..@.;.f Tho...(xVs..m.c..F..SS.C...z[....z...... .X.&....HY,...o.d..jP.nr..@.)..W.1#...b..Q.*E8.B..N5.....].........7..A..2c.M.q.O0(.Gi..B.....CT.(..+....>@T j.#!..."..P.u.3..5.Q0K..p....ERvG..._'...ir%m...NT.v:.....g.....8.+....m....8..Z.=.B.......D_..ln...C.......p8...e."...U...+.f..E.=X.j.DeD.X_.Y..n.r.!xWu..\.VB.......`.F.A....dx...
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):648384
                                                                                      Entropy (8bit):6.666474522542094
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:gAQxmcOwzIYhoz/eZz4gOIwEODAAwnq6Nql1:gvmfAI6oz/uOIyDAAwDNql1
                                                                                      MD5:CE7DE939D74321A7D0E9BDF534B89AB9
                                                                                      SHA1:56082B4E09A543562297E098A36AADC3338DEEC5
                                                                                      SHA-256:A9DC70ABB4B59989C63B91755BA6177C491F6B4FE8D0BFBDF21A4CCF431BC939
                                                                                      SHA-512:03C366506481B70E8BF6554727956E0340D27CB2853609D6210472AEDF4B3180C52AAD9152BC2CCCBA005723F5B2E3B5A19D0DCE8B8D1E0897F894A4BFEEFE55
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...".t.........................g.........................0................ ..........................................................,.......=..........................,=.......................................................text....r.......t..................`.P`.data............ ...x..............@.`..rdata..L...........................@.`@/4...................\..............@.0@.bss..................................`..edata...............`..............@.0@.idata...............j..............@.0..CRT....,............v..............@.0..tls.................x..............@.0..reloc...=.......>...z..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):126478
                                                                                      Entropy (8bit):6.268811819718352
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:UnNKg6JaJUeHjiaphKMLrn8uexz3TmBUg6xcE:UNcJGGehKMLJBUg6x
                                                                                      MD5:6E93C9C8AADA15890073E74ED8D400C9
                                                                                      SHA1:94757DBD181346C7933694EA7D217B2B7977CC5F
                                                                                      SHA-256:B6E2FA50E0BE319104B05D6A754FE38991E6E1C476951CEE3C7EBDA0DC785E02
                                                                                      SHA-512:A9F71F91961C75BB32871B1EFC58AF1E1710BDE1E39E7958AE9BB2A174E84E0DD32EBAAB9F5AE37275651297D8175EFA0B3379567E0EB0272423B604B4510852
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....^...................p.....m.........................p......f......... .........................{.... ...............................P..............................X........................!...............................text....\.......^..................`.P`.data........p.......b..............@.`..rdata..h&.......(...d..............@.`@/4......\B.......D..................@.0@.bss..................................`..edata..{...........................@.0@.idata....... ......................@.0..CRT....,....0......................@.0..tls.........@......................@.0..reloc.......P......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):11532
                                                                                      Entropy (8bit):7.219753259626605
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Dqv1jf+0vAe7Dl+JTGxuK5Rbfh70Il9MWbzq6UWkE0FGemexbiJi8TK0Q2:m9KIAeNgTGxu2Jfh1DMSzqKkvFGLJi85
                                                                                      MD5:073F34B193F0831B3DD86313D74F1D2A
                                                                                      SHA1:3DF5592532619C5D9B93B04AC8DBCEC062C6DD09
                                                                                      SHA-256:C5EEC9CD18A344227374F2BC1A0D2CE2F1797CFFD404A0A28CF85439D15941E9
                                                                                      SHA-512:EEFD583D1F213E5A5607C2CFBAED39E07AEC270B184E61A1BA0B5EF67ED7AC5518B5C77345CA9BD4F39D2C86FCD261021568ED14945E7A7541ADF78E18E64B0C
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-I133A.tmp, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L.....V...........!.........(...............P............................................@.........................P...........d....p..8...................82.........................................................8....................................`.......$..................@..@.rsrc........p.......&..............@..@.......................................@petite...............*..............`..`....................................#..L....y......"......O/..M...C.A.&:.e.i..l....CP...g.AK..S;.lf.?.g....].k.U.G.Y.J.",......%....:ge.D x.P }}..Tih.g......%G.Iy.j...\..*.S...s..$..........o..y..........,.........-..X.....v.M1..*'...5R.4..8k!..q.=*BVST<..M.E.._T.p...K.r....C.HEO....\..%%,I....>'.L.ct..{..I..l.Y#f Tk*...:bH?.....G..Y.p..Q.....z/R.h>8....]S.....p.c/.m..6tc.d..(..{...=w4.w.^..d.....^..Tp.....Z.*.).Z."...&.-...o...xD+0.L+!...X.%?)+.P..Z.......P..F..P.".._.%9.^T;(..Y.>.. .....re
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):852754
                                                                                      Entropy (8bit):6.503318968423685
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:fpFFQV+FKJ37Dm+yY4pBkPr2v2meLaoHN/oBrZ3ixdnGVzpJXm/iN:fpnzFw37iDYIBkzuPcHNgrZ3uGVzm/iN
                                                                                      MD5:07FB6D31F37FB1B4164BEF301306C288
                                                                                      SHA1:4CB41AF6D63A07324EF6B18B1A1F43CE94E25626
                                                                                      SHA-256:06DDF0A370AF00D994824605A8E1307BA138F89B2D864539F0D19E8804EDAC02
                                                                                      SHA-512:CAB4A7C5805B80851ABA5F2C9B001FABC1416F6648D891F49EACC81FE79287C5BAA01306A42298DA722750B812A4EA85388FFAE9200DCF656DD1D5B5B9323353
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..Y.,..v......!......... .....................a................................O}........ ......................................@.......................P..X0...........................0.......................................................text...............................`.P`.data...............................@.`..rdata..............................@.`@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,.... ......................@.0..tls.... ....0......................@.0..rsrc........@......................@.0..reloc..X0...P...2..................@.0B/4...................&..............@.@B/19.................*..............@..B/31..........@......................@..B/45..........`......................@..B/57.................................@.0B/70.....i...............
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):36752
                                                                                      Entropy (8bit):7.780431937344781
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:E7epCl6I8YbTvEKXQ2vm+iocmmMt7KjuDnlVahRlmftuY5B:EepUv8aZvmd+7nDDalauy
                                                                                      MD5:9FF783BB73F8868FA6599CDE65ED21D7
                                                                                      SHA1:F515F91D62D36DC64ADAA06FA0EF6CF769376BDF
                                                                                      SHA-256:E0234AF5F71592C472439536E710BA8105D62DFA68722965DF87FED50BAB1816
                                                                                      SHA-512:C9D3C3502601026B6D55A91C583E0BB607BFC695409B984C0561D0CBE7D4F8BD231BC614E0EC1621C287BF0F207017D3E041694320E692FF00BC2220BFA26C26
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b...........!.........n.......................................................B....@.........................P...........d.......@............s.......x..........................................................8............................................j..................@..@.rsrc.... ...........l..............@..@petite...............p..............`..`..................8..u...I.x|}...g{...@..ffe.c4.-.Bj..........U.J.`..s.N:`..I@;..B.kbmj..E%2. `....".]&.&.).BB...E..4u'.....Q.......%....V.............5...y....E..q<w.....j...B..O...p....*.X...m...= .X..........4........~~.8.F@.V...6....;?.5..)S.m.9U......^.zO!1o.F.E. ...H=`2...9.(...4).E.!G..;R.1.#.h0..(*..t8..O...Td.d..~...l.a..U...b<../..W....M6...U*G..II.x........>..I[...v.N/.V..3..Y.c...Zh.i..i.....n....M..D....5o."....(.9.+..z...._$t.T...X#\...N....Q%...>U..|....J
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):258560
                                                                                      Entropy (8bit):6.491223412910377
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:X+FRYMGwNozw5upAagZnb80OXrGSc+w9nI7ZMcyVhk233M:SGMGbw5upAagZb80SMXzkgM
                                                                                      MD5:DB191B89F4D015B1B9AEE99AC78A7E65
                                                                                      SHA1:8DAC370768E7480481300DD5EBF8BA9CE36E11E3
                                                                                      SHA-256:38A75F86DB58EB8D2A7C0213861860A64833C78F59EFF19141FFD6C3B6E28835
                                                                                      SHA-512:A27E26962B43BA84A5A82238556D06672DCF17931F866D24E6E8DCE88F7B30E80BA38B071943B407A7F150A57CF1DA13D2137C235B902405BEDBE229B6D03784
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.j..f...f...f..]....f..]...f..]....f......f......f......f......f..]....f...f..]f......f......f......f...f...f......f..Rich.f..........PE..L...y.._...........!................@........ ...............................@..........................................d...$...(.......h.................... ......................................(...@............ ..8............................text...q........................... ..`asmcode.>$.......&.................. ..`.rdata..B.... ......................@..@.data...............................@....rsrc...h...........................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):294926
                                                                                      Entropy (8bit):6.191604766067493
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:7E0FFjiAeF21pLQFgK33duKMnlCj3eWyNg2hlNvFXl8rzJjjOjVmdX566Uwqwqwm:wKFX3LygKjjN2HIfpruwqwqwFUgVE
                                                                                      MD5:C76C9AE552E4CE69E3EB9EC380BC0A42
                                                                                      SHA1:EFFEC2973C3D678441AF76CFAA55E781271BD1FB
                                                                                      SHA-256:574595B5FD6223E4A004FA85CBB3588C18CC6B83BF3140D8F94C83D11DBCA7BD
                                                                                      SHA-512:7FB385227E802A0C77749978831245235CD1343B95D97E610D20FB0454241C465387BCCB937A2EE8A2E0B461DD3D2834F7F542E7739D8E428E146F378A24EE97
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.........|.....................n.................................c........ ......................`..j7...........................................................................................................................text...8...........................`.P`.data...x...........................@.0..rdata...F.......H..................@.`@/4.......U.......V..................@.0@.bss.........P........................`..edata..j7...`...8...$..............@.0@.idata...............\..............@.0..CRT....,............b..............@.0..tls.................d..............@.0..reloc...............f..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):867854
                                                                                      Entropy (8bit):4.9264497464202694
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:p3y+OSQJZyHHiz8ElQxPpspcQrRclB7OIlJiIoP:xSXyniz1lQxPpspcQrRcLZJi/
                                                                                      MD5:B476CA59D61F11B7C0707A5CF3FE6E89
                                                                                      SHA1:1A1E7C291F963C12C9B46E8ED692104C51389E69
                                                                                      SHA-256:AD65033C0D90C3A283C09C4DB6E2A29EF21BAE59C9A0926820D04EEBBF0BAF6D
                                                                                      SHA-512:D5415AC7616F888DD22560951E90C8A77D5DD355748FDCC3114CAA16E75EB1D65C43696C6AECD2D9FAF8C2D32D5A3EF7A6B8CB6F2C4747C2A82132D29C9ECBFE
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........>.........#.........:....................Xd................................l6........ ......................@..b....P..p................................*..........................L.......................0Q...............................text...D...........................`.P`.data...x...........................@.P..rdata...%.......&..................@.`@/4.......K.......L..................@.0@.bss.........0........................`..edata..b....@......................@.0@.idata..p....P......................@.0..CRT....,....`......................@.0..tls.........p......................@.0..reloc...*.......,..................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):512014
                                                                                      Entropy (8bit):6.566561154468342
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:BNKab1bu1dEpBZvkO4KTYnyA0bFHmufLKNs3gv:rKcozEpbvkOCyA0xGufLKau
                                                                                      MD5:C4A2068C59597175CD1A29F3E7F31BC1
                                                                                      SHA1:89DE0169028E2BDD5F87A51E2251F7364981044D
                                                                                      SHA-256:7AE79F834A4B875A14D63A0DB356EEC1D356F8E64FF9964E458D1C2050E5D180
                                                                                      SHA-512:0989EA9E0EFADF1F6C31E7FC243371BB92BFD1446CF62798DCA38A021FAD8B6ADB0AEABDFBDC5CE8B71FE920E341FC8AB4E906B1839C6E469C75D8148A74A08A
                                                                                      Malicious:false
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P/.d...........#...(.l.........................n.........................P............@... ..........................:........... .......................0..L...........................d...........................P............................text....k.......l..................`..`.data................p..............@....rdata...t.......v...r..............@..@/4......L...........................@..@.bss....X................................edata...:.......<...j..............@..@.idata..............................@....CRT....,...........................@....tls................................@....rsrc........ ......................@....reloc..L....0......................@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):68876
                                                                                      Entropy (8bit):7.922125376804506
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:q0Z4sz1ZMjCjDIhoLffiedENahBzzxO/JfgmYFGKEvi8TxCI+vHVl:v4MzMjGkhoLfsahS/JYN2vUl
                                                                                      MD5:4E35BA785CD3B37A3702E577510F39E3
                                                                                      SHA1:A2FD74A68BEFF732E5F3CB0835713AEA8D639902
                                                                                      SHA-256:0AFE688B6FCA94C69780F454BE65E12D616C6E6376E80C5B3835E3FA6DE3EB8A
                                                                                      SHA-512:1B839AF5B4049A20D9B8A0779FE943A4238C8FBFBF306BC6D3A27AF45C76F6C56B57B2EC8F087F7034D89B5B139E53A626A8D7316BE1374EAC28B06D23E7995D
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-MGN69.tmp, Author: Joe Security
                                                                                      Antivirus:
                                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                                      Preview:MZ......................@...................................D.... ..PE..L.....U]...........!......................... ............................................@.........................P...........d.......@...............................................................................8...............................................................@..@.rsrc...............................@..@.......................................@petite..............................`..`...........................................&MK#H..OEJ..}??...:..$ayf.r7.w(/*.d`...A(7.%p.f.>\..d."..W......[4.0..ZY..... .....~...T....9a+..'.......g!.....l...<..?Y.(..[k.I=....D.....c.*.=.?.8...D>0...#.ZdO..Z...%......X.P..bS..s..=$...m.N........A......A4..J>Wa.N..K.>....2n8.ii.#....y#.J ....i!...a7..Pbl@B.%h0..8RSr.........]..z.\...x..e..5.3.$h. <G.3....-......Q....O0..,......Y}......@...<...t.H).T..! .....ap......Tj.o...0b...`..yX.. g...hzA...b.7.s$M.... ..'....\$...H.\.l.C g..4..(.6@.Q....B(..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):7910
                                                                                      Entropy (8bit):6.931925007191986
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:piDl1jKrGer007ia6abHX0d/aeHeN+VPHIJQxNiJCl9AK0f:IDJ9aDb30dCe+4PHIJrJCl9AK0f
                                                                                      MD5:1268DEA570A7511FDC8E70C1149F6743
                                                                                      SHA1:1D646FC69145EC6A4C0C9CAD80626AD40F22E8CD
                                                                                      SHA-256:F266DBA7B23321BF963C8D8B1257A50E1467FAAAB9952EF7FFED1B6844616649
                                                                                      SHA-512:E19F0EA39FF7AA11830AF5AAD53343288C742BE22299C815C84D24251FA2643B1E0401AF04E5F9B25CAB29601EA56783522DDB06C4195C6A609804880BAE9E9B
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-N4QUM.tmp, Author: Joe Security
                                                                                      Preview:MZ......................@...................................D.... ..PE..L.....V...........!.................p.......0............................................@.........................Pr.......q..d....P.......................%.......................................................q..8....................................@..........................@..@.rsrc........P......................@..@.............`.........................@petite.......p......................`..`.........................................|7{M..... ........r B`.Zr..P.........T}.e..YJ...=.X..q.}......b.I...G.....^.d...R..-R.....d_.......K.q.H.A=.-S..,_.....L...........2.............u.u.%...:.q....c.[.....`...\.X..8..B.@L..3.7.q.....)!.- ...D.....p...J...RU..Q.A..[.#&..R.....".+4...px/7..\....4...., ..8...5.hV.>] ....3.-.<..I+.<r..T..H,Q..!..i--..+.Zq.[...H... ...N.8..#...a.x.iU.G..-_..R....Z(cT%.....S.P.U:g?...;....&....@..KI.X.Q..PQ..v..*....{..~..}..f....c..`....Q...q..%......,j.4.Y..)....Cf7..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):62478
                                                                                      Entropy (8bit):6.063363187934607
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:q3s6+NMpjqudP/XB9rGCWLEc6wY3U0LvDcb0wGNPdqdRJy/5f4mdajO42iySAqB:q8zNM1nBId/ce7GNP6m/5AQGySAs
                                                                                      MD5:940EEBDB301CB64C7EA2E7FA0646DAA3
                                                                                      SHA1:0347F029DA33C30BBF3FB067A634B49E8C89FEC2
                                                                                      SHA-256:B0B56F11549CE55B4DC6F94ECBA84AEEDBA4300D92F4DC8F43C3C9EEEFCBE3C5
                                                                                      SHA-512:50D455C16076C0738FB1FECAE7705E2C9757DF5961D74B7155D7DFB3FAB671F964C73F919CC749D100F6A90A3454BFF0D15ED245A7D26ABCAA5E0FDE3DC958FD
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...............................k.........................`................ .........................r.......D............................P..|.......................................................\............................text...............................`.P`.data...0...........................@.0..rdata..8...........................@.`@/4......L...........................@.0@.bss..................................`..edata..r...........................@.0@.idata..D...........................@.0..CRT....,....0......................@.0..tls.........@......................@.0..reloc..|....P......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:Unicode text, UTF-8 text
                                                                                      Category:dropped
                                                                                      Size (bytes):1059
                                                                                      Entropy (8bit):5.1208137218866945
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:LLDrmJHHH0yN3gtsHw1hj9QHOsUv4eOk4/+/m3oqLF5n:LLDaJHlxE35QHOs5exm3ogF5n
                                                                                      MD5:B7EDCC6CB01ACE25EBD2555CF15473DC
                                                                                      SHA1:2627FF03833F74ED51A7F43C55D30B249B6A0707
                                                                                      SHA-256:D6B4754BB67BDD08B97D5D11B2D7434997A371585A78FE77007149DF3AF8D09C
                                                                                      SHA-512:962BD5C9FB510D57FAC0C3B189B7ADEB29E00BED60F0BB9D7E899601C06C2263EDA976E64C352E4B7C0AAEFB70D2FCB0ABEF45E43882089477881A303EB88C09
                                                                                      Malicious:false
                                                                                      Preview:Copyright (c) 2011 Jan Kokem.ller..Permission is hereby granted, free of charge, to any person obtaining a copy.of this software and associated documentation files (the "Software"), to deal.in the Software without restriction, including without limitation the rights.to use, copy, modify, merge, publish, distribute, sublicense, and/or sell.copies of the Software, and to permit persons to whom the Software is.furnished to do so, subject to the following conditions:..The above copyright notice and this permission notice shall be included in.all copies or substantial portions of the Software...THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR.IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,.FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE.AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER.LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,.OUT OF OR IN CONNECTION WITH
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):35588
                                                                                      Entropy (8bit):7.817557274117395
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:dCrMZHv56WRldhmLjQDrbfc8cznHvc6modHQ:sAR0LzHvc6m2HQ
                                                                                      MD5:58521D1AC2C588B85642354F6C0C7812
                                                                                      SHA1:5912D2507F78C18D5DC567B2FA8D5AE305345972
                                                                                      SHA-256:452EEE1E4EF2FE2E00060113CCE206E90986E2807BB966019AC4E9DEB303A9BD
                                                                                      SHA-512:3988B61F6B633718DE36C0669101E438E70A17E3962A5C3A519BDECC3942201BA9C3B3F94515898BB2F8354338BA202A801B22129FC6D56598103B13364748C1
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-P98GR.tmp, Author: Joe Security
                                                                                      Preview:MZ......................@...................................D.... ..PE..L.....yX...........!.................@.......................................P............@.........................PB.......A..d.... ..@...................P........................................................A..8...............................................................@..@.rsrc........ ......................@..@.............0.........................@petite.......@......................`..`...................................._3.....g.ge..7t...R-_.R.@c.S.\..J?L.EZ.,....=H8..;.QJ.....P-)eFs93:.^...f......}..?...e...SD.......-.u.......q2...P...6..z5.T.S..P..Q....@..Mq.>....8" F...,..FE...S.[U..c......jr....b...-%...`......w..+W.C......]..#......LS....W.Y....o.8...i.[)..%(.2.t...YY .bL.....b.@&J,?l.........$..F..&...a#.\[".^...&]co....K.>...xQzw..XW.uT..+dm.o.b...@c....3..r....@]...P........{C/.....A!.&..........'....._..."S..&..F.......:.dxtK.6...7.I...Q..Nm2.....NX..fG..L..7.?..".(
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):39304
                                                                                      Entropy (8bit):7.819409739152795
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:i5GGx+OZPWuGdoiwUpPLH7IN3x1eW0kIAJbfT13MMnahRlmftuohQf:i5DxDPWMApPLsNhkVkI6R3TnalauoQ
                                                                                      MD5:C7A50ACE28DDE05B897E000FA398BBCE
                                                                                      SHA1:33DA507B06614F890D8C8239E71D3D1372E61DAA
                                                                                      SHA-256:F02979610F9BE2F267AA3260BB3DF0F79EEEB6F491A77EBBE719A44814602BCC
                                                                                      SHA-512:4CD7F851C7778C99AFED492A040597356F1596BD81548C803C45565975CA6F075D61BC497FCE68C6B4FEDC1D0B5FD0D84FEAA187DC5E149F4E8E44492D999358
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....."b...........!.........x.......P.......................................`.......Z....@.........................PR.......Q..d....0..0............}......D........................................................Q..8.................................... .......t..................@..@.rsrc.... ...0.......v..............@..@petite.......P.......z..............`..`......................p..k..K..i{..\.H..'.|w.t...\..dkB%..i.cX...`*B...m.X..A.NU.i.I. J.I....x-.e2n.IA.2.:..2G5Z/.+(8w.S<...`ML........!..%+.r.s.1.~.D...]......U..q3.....9..?y.>j.E.T...Y..D..>..aJ......P^Y..w?.9w.,...+C^.[....|..'.....7..F%..A.....)..b.)8.2Q`.v.F=.."S*..{z...z-H=....L_....RM..s......H2P1a....[..i. 2..~.?...+R... .m(.I..X...H.g.Z..i..G.?.(......e.:.B......fh......gl.x.Z......I>..#....Hgv.;g.@ l.$(...0.........l.>.p..z;A.@...*4v..x.U.gU..Bqqb..6.x...D.....cIE(5m.g}J..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):967168
                                                                                      Entropy (8bit):6.500850562754145
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:j2ezAN6FpYQSzclODziLQEkkDHFb1aWGssVvVmPUwV+SiRm7rhj:jhAgFptPlqmPDHJ1apVdYUy+jRmX
                                                                                      MD5:C06D6F4DABD9E8BBDECFC5D61B43A8A9
                                                                                      SHA1:16D9F4F035835AFE8F694AE5529F95E4C3C78526
                                                                                      SHA-256:665D47597146DDAAA44B771787B750D3CD82C5B5C0B33CA38F093F298326C9BB
                                                                                      SHA-512:B0EBE9E2682A603C34F2B884121FA5D2D87ED3891990CCD91CD14005B28FE208A3B86FA20E182F9E7FC5142A267C8225AEFDCB23CF5B7556D2CF8F9E3BDE62D4
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V.~..m...m...m......m.....m......m.......m..)3...m..)3...m..)3...m.......m...m..rm...m..m..3...m..3...m..3...m..Rich.m..........................PE..L...8..^...........!.........&.......`....................................................@..........................4.......G..<...............................HR..P+..T............................+..@...............D............................text............................... ..`.rdata..............................@..@.data........P...$...D..............@....trace.......`.......h..............@..@.gfids...............~..............@..@_RDATA..@...........................@..@.debug_o............................@..B.rsrc................l..............@..@.reloc..HR.......T...n..............@..B................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):149845
                                                                                      Entropy (8bit):7.893881970959476
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:y0z4JQHu5EvSA/JqiK2s6g+hUCQiMVQ623hi3JKz8KQP6ZwhQrNrbZ:yUju5GY7l+CCYVQ62YUzXQiqhQrJbZ
                                                                                      MD5:526E02E9EB8953655EB293D8BAC59C8F
                                                                                      SHA1:7CA6025602681EF6EFDEE21CD11165A4A70AA6FE
                                                                                      SHA-256:E2175E48A93B2A7FA25ACC6879F3676E04A0C11BB8CDFD8D305E35FD9B5BBBB4
                                                                                      SHA-512:053EB66D17E5652A12D5F7FAF03F02F35D1E18146EE38308E39838647F91517F8A9DC0B7A7748225F2F48B8F0347B0A33215D7983E85FCA55EF8679564471F0B
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S2I8K.tmp, Author: Joe Security
                                                                                      Preview:MZ......................@...................................D.... ..PE..L....r.[...........!....U....D............... ............................... ............@.........................P...........d............................N..........................................................8............................................@..................@..@.rsrc................B..............@..@.......................................@petite..U.......U....F..............`..`.....................................5....`K...=1.;;..s}....3500.z.<..]goR.lVO..C..j...........O......9#f.S.$1.b.D.8...VX....sb .A.%I......B.........R...Z5.............y......_W.0.!..T..nT.V..J..s.1`..V...Cb.2x0......0B...4...D.`...!.>[7..^;w'.u"W/...).P.m...P.......qF<.~1..T.>F.F.Rr.`...N....3$...w.L..P..SQP]C^.....2...%5.v...3.a`.k....q.0.o..A......k.....B..P.h.fy..jyb...<t$.%c-...<9.1#2.7./0.j.o#~...,!fuJ.M..a...(...0@.........,..t.3d"qva....fm.=.....]....s...z}-X..3................y>.!......g..E
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):8456
                                                                                      Entropy (8bit):6.767152008521429
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:yxPHUtfhriUVoSoGtyo2xmJ8GbarAtT7/lxjFZnPK0cl:KPehriU3t2IiGbHTxZnPK0cl
                                                                                      MD5:19E08B7F7B379A9D1F370E2B5CC622BD
                                                                                      SHA1:3E2D2767459A92B557380C5796190DB15EC8A6EA
                                                                                      SHA-256:AC97E5492A3CE1689A2B3C25D588FAC68DFF5C2B79FCF4067F2D781F092BA2A1
                                                                                      SHA-512:564101A9428A053AA5B08E84586BCBB73874131154010A601FCE8A6FC8C4850C614B4B0A07ACF2A38FD2D4924D835584DB0A8B49EF369E2E450E458AC32CF256
                                                                                      Malicious:false
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_PetiteVirus, Description: Yara detected Petite Virus, Source: C:\Program Files (x86)\RButtonTRAY\bin\x86\is-S509N.tmp, Author: Joe Security
                                                                                      Preview:MZ......................@...................................D.... ..PE..L...#.MZ...........!.................p.......0............................................@.........................Pr.......q..d....P..8....................%.......................................................q..8....................................@..........................@..@.rsrc........P......................@..@.............`.........................@petite.......p......................`..`..................................................l..a.......1...3W..Z.....H...5.(...$.. .>X9..Fn... ..."j1..........%.7.d...".m...n.ePY......`....I.gYo..UC....Rq(...F......s..8`.I.....i..F.....'......@..-;.........J...Oq...b@...........$.D4E..($.....8':*;.q....[-..{..w....@M....J$..0d..9Q.I^.^y.E..*L_-.x!s.......W.H.R..@.6....MQ.Q8.s.."...!."IX.vM...!e.$%......U.....F.CoI..X.dA...0.Y..r.8.*p...<..M y...8..s....N5<.J....&..`...w..'..\s..%..A.`....s..j.H...X#..R.\..)R3@..X.P.5...G..t.f/..C.b.d...|.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):214016
                                                                                      Entropy (8bit):6.676457645865373
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:v3UEEkp2yVTcc295GSSazZq0/OlxAOxN5jZ2Ti30ezAg0Fu9RBhk1Xion:cEEpYcc2G/adqLtxLZ2+vAO9Hhkzn
                                                                                      MD5:2C747F19BF1295EBBDAB9FB14BB19EE2
                                                                                      SHA1:6F3B71826C51C739D6BB75085E634B2B2EF538BC
                                                                                      SHA-256:D2074B91A63219CFD3313C850B2833CD579CC869EF751B1F5AD7EDFB77BD1EDD
                                                                                      SHA-512:C100C0A5AF52D951F3905884E9B9D0EC1A0D0AEBE70550A646BA6E5D33583247F67CA19E1D045170A286D92EE84E1676A6C1B0527E017A35B6242DD9DEE05AF4
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}6,.9WB.9WB.9WB...9.:WB.9WC.hWB....;WB."..&WB."..WB."...WB.9WB.?WB."..8WB."..8WB."..8WB.Rich9WB.........PE..L......W...........!.....N...........n.......`............................................@.........................`...h.......(....`..X....................p.......................................................`...............................text...?L.......N.................. ..`.rdata......`.......R..............@..@.data....W.......2..................@....rsrc...X....`......................@..@.reloc..f&...p...(..................@..B........................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):68042
                                                                                      Entropy (8bit):6.090396152400884
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:RX3HAdi7wgCsL6dVSngk2IFm3ZJVRDBLRROBBKRzPm3YRiF+ixh:NHQpe6SnZQLjICPm3Ytib
                                                                                      MD5:5DDA5D34AC6AA5691031FD4241538C82
                                                                                      SHA1:22788C2EBE5D50FF36345EA0CB16035FABAB8A6C
                                                                                      SHA-256:DE1A9DD251E29718176F675455592BC1904086B9235A89E6263A3085DDDCBB63
                                                                                      SHA-512:08385DE11A0943A6F05AC3F8F1E309E1799D28EA50BF1CA6CEB01E128C0CD7518A64E55E8B56A4B8EF9DB3ECD2DE33D39779DCA1FBF21DE735E489A09159A1FD
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........V......#...&...........................d......................................@... ..............................0..t....`..P....................p.......................................................1..H............................text...d...........................`..`.data...L...........................@....rdata..\...........................@..@/4.......2.......4..................@..@.bss.....................................edata..............................@..@.idata..t....0......................@....CRT....0....@......................@....tls.........P......................@....rsrc...P....`......................@....reloc.......p......................@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):112640
                                                                                      Entropy (8bit):6.540227486061059
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:45vq1zsdXYjZmGz9anu3MwjLA/eeiUKJP3Djl23HTKJ7WMU3lPyK+ZSrKxV/UJ9G:vzMMg/gMKeGsMIl6K+Zvry5zNY
                                                                                      MD5:BDB65DCE335AC29ECCBC2CA7A7AD36B7
                                                                                      SHA1:CE7678DCF7AF0DBF9649B660DB63DB87325E6F69
                                                                                      SHA-256:7EC9EE07BFD67150D1BC26158000436B63CA8DBB2623095C049E06091FA374C3
                                                                                      SHA-512:8AABCA6BE47A365ACD28DF8224F9B9B5E1654F67E825719286697FB9E1B75478DDDF31671E3921F06632EED5BB3DDA91D81E48D4550C2DCD8E2404D566F1BC29
                                                                                      Malicious:false
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................f...N......0u............@.....................................................................2.......v...............................h...................................................................................CODE....Pe.......f.................. ..`DATA....D............j..............@...BSS......................................idata..v...........................@....edata..2...........................@..P.reloc..h...........................@..P.rsrc...............................@..P....................................@..P................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):26526
                                                                                      Entropy (8bit):4.600837395607617
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:Lc56OuAbnn0UReX6wFDVxnFw7xqsvzt+z/k8E9HinIhFkspcM9bc7ups0CZuQG:Lc5trLeDnFMz1ReScmc7GshZuQG
                                                                                      MD5:BD7A443320AF8C812E4C18D1B79DF004
                                                                                      SHA1:37D2F1D62FEC4DA0CAF06E5DA21AFC3521B597AA
                                                                                      SHA-256:B634AB5640E258563C536E658CAD87080553DF6F34F62269A21D554844E58BFE
                                                                                      SHA-512:21AEF7129B5B70E3F9255B1EA4DC994BF48B8A7F42CD90748D71465738D934891BBEC6C6FC6A1CCFAF7D3F35496677D62E2AF346D5E8266F6A51AE21A65C4460
                                                                                      Malicious:false
                                                                                      Preview: GNU LESSER GENERAL PUBLIC LICENSE. Version 2.1, February 1999.. Copyright (C) 1991, 1999 Free Software Foundation, Inc.. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. Everyone is permitted to copy and distribute verbatim copies. of this license document, but changing it is not allowed...[This is the first released version of the Lesser GPL. It also counts. as the successor of the GNU Library Public License, version 2, hence. the version number 2.1.].. Preamble.. The licenses for most software are designed to take away your.freedom to share and change it. By contrast, the GNU General Public.Licenses are intended to guarantee your freedom to share and change.free software--to make sure the software is free for all its users... This license, the Lesser General Public License, applies to some.specially designated software packages--typically libraries--of the.Free Software Foundation and other authors who
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):31936
                                                                                      Entropy (8bit):6.6461204214578
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:SEEn30ilOAb++HynTDbc3fwaVCPxWE/MM:SEa0YOU1HgU3fwaVCPxqM
                                                                                      MD5:72E3BDD0CE0AF6A3A3C82F3AE6426814
                                                                                      SHA1:A2FB64D5B9F5F3181D1A622D918262CE2F9A7AA3
                                                                                      SHA-256:7AC8A8D5679C96D14C15E6DBC6C72C260AAEFB002D0A4B5D28B3A5C2B15DF0AB
                                                                                      SHA-512:A876D0872BFBF099101F7F042AEAF1FD44208A354E64FC18BAB496BEEC6FDABCA432A852795CFC0A220013F619F13281B93ECC46160763AC7018AD97E8CC7971
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........P.........#.....&...L...............@.....d................................8......... .........................b............................P...,...................................R......................x................................text....%.......&..................`.P`.data........@.......*..............@.`..rdata.......P.......,..............@.0@/4...........`.......2..............@.0@.bss.........p........................`..edata..b............>..............@.0@.idata...............@..............@.0..CRT....,............H..............@.0..tls.................J..............@.0..reloc...............L..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):15374
                                                                                      Entropy (8bit):5.192037544202194
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:lhgkOI7BGi9gKV6uq+u6JewsNhNXUwSCgQ:DT7BGVKPKbXF
                                                                                      MD5:BEFD36FE8383549246E1FD49DB270C07
                                                                                      SHA1:1EF12B568599F31292879A8581F6CD0279F3E92A
                                                                                      SHA-256:B5942E8096C95118C425B30CEC8838904897CDEF78297C7BBB96D7E2D45EE288
                                                                                      SHA-512:FD9AA6A4134858A715BE846841827196382D0D86F2B1AA5C7A249B770408815B0FE30C4D1E634E8D6D3C8FEDBCE4654CD5DC240F91D54FC8A7EFE7CAE2E569F4
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........<.........#.........8...............0.....f................................b......... ......................p..E.......h...........................................................P@......................................................text...............................`.P`.data...,....0....... ..............@.0..rdata.......@......."..............@.0@/4...........P.......$..............@.0@.bss.........`........................`..edata..E....p......................@.0@.idata..h............0..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):43520
                                                                                      Entropy (8bit):6.232860260916194
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:XozEJVjDF38DrOPwLg0cAY7K+k+Y+TyHMjMbHVJx9jm3LkkteFfXbBekdAnPKx:Xo4JJDirOoLg0C7F/rDGdpB52PK
                                                                                      MD5:B162992412E08888456AE13BA8BD3D90
                                                                                      SHA1:095FA02EB14FD4BD6EA06F112FDAFE97522F9888
                                                                                      SHA-256:2581A6BCA6F4B307658B24A7584A6B300C91E32F2FE06EB1DCA00ADCE60FA723
                                                                                      SHA-512:078594DE66F7E065DCB48DA7C13A6A15F8516800D5CEE14BA267F43DC73BC38779A4A4ED9444AFDFA581523392CBE06B0241AA8EC0148E6BCEA8E23B78486824
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....z.......D................,n.........................p.......`........ ...................... .......0...............................`..............................t........................0...............................text....x.......z..................`.P`.data...,............~..............@.0..rdata..............................@.P@.eh_fram|...........................@.0@.bss.....B............................`..edata....... ......................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.........P......................@.0..reloc.......`......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):845312
                                                                                      Entropy (8bit):6.581151900686739
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:PgQ5Lxf4qcB5SdtFJPAYiXbJ1luVw6DbhJLJbCKShfCtk/8ou/UvfK7hs4I:H5Ng9zK5Puq7hsN
                                                                                      MD5:00C672988C2B0A2CB818F4D382C1BE5D
                                                                                      SHA1:57121C4852B36746146B10B5B97B5A76628F385F
                                                                                      SHA-256:4E9F3E74E984B1C6E4696717AE36396E7504466419D8E4323AF3A89DE2E2B784
                                                                                      SHA-512:C36CAE5057A4D904EBDB5495E086B8429E99116ACBE7D0F09FB66491F57A7FC44232448208044597316A53C7163E18C2F93336B37B302204C8AF6C8F1A9C8353
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2...va.va.va.b..fa.b...a.b..`a.$..ya.$..`a.$..1a.b..ua.va.*a. ...a. ..wa. ...wa.vat.wa. ..wa.Richva.................PE..L......c...........!.................F.......0............................... ......u.....@.......................... ...q..t...(....P.......................`..p.......T...........................8...@............0..D............................text............................... ..`.rdata...i...0...j..................@..@.data...............................@....rsrc........P.......(..............@..@.reloc..p....`......................@..B........................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):967168
                                                                                      Entropy (8bit):6.500850562754145
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:j2ezAN6FpYQSzclODziLQEkkDHFb1aWGssVvVmPUwV+SiRm7rhj:jhAgFptPlqmPDHJ1apVdYUy+jRmX
                                                                                      MD5:C06D6F4DABD9E8BBDECFC5D61B43A8A9
                                                                                      SHA1:16D9F4F035835AFE8F694AE5529F95E4C3C78526
                                                                                      SHA-256:665D47597146DDAAA44B771787B750D3CD82C5B5C0B33CA38F093F298326C9BB
                                                                                      SHA-512:B0EBE9E2682A603C34F2B884121FA5D2D87ED3891990CCD91CD14005B28FE208A3B86FA20E182F9E7FC5142A267C8225AEFDCB23CF5B7556D2CF8F9E3BDE62D4
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V.~..m...m...m......m.....m......m.......m..)3...m..)3...m..)3...m.......m...m..rm...m..m..3...m..3...m..3...m..Rich.m..........................PE..L...8..^...........!.........&.......`....................................................@..........................4.......G..<...............................HR..P+..T............................+..@...............D............................text............................... ..`.rdata..............................@..@.data........P...$...D..............@....trace.......`.......h..............@..@.gfids...............~..............@..@_RDATA..@...........................@..@.debug_o............................@..B.rsrc................l..............@..@.reloc..HR.......T...n..............@..B................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):506871
                                                                                      Entropy (8bit):7.998074018431883
                                                                                      Encrypted:true
                                                                                      SSDEEP:12288:VCtY2iynJj4iqp1WjsxlD71zFusqzKZXGky4H2po:V+Y1y7qp0oxF7T3ZXGky4Wq
                                                                                      MD5:D52F8AE89AC65F755C28A95C274C1FFE
                                                                                      SHA1:50D581469FF0648EE628A027396F39598995D8B0
                                                                                      SHA-256:2F9A9DFD0C0B0CFAF9C700B4659A4F2F3D11368E6C30A3FA0F93ECDD3B4D2E66
                                                                                      SHA-512:B7B585EED261C262499C73688DFD985818F7869319285168AEEAC1F2CF5FAD487280FCAE1DAC633296E5DB0E0BC454495A09A90C2E37A7E7AF07EF93563503C6
                                                                                      Malicious:false
                                                                                      Preview:PK...........N..UD...."....$.AddWindowsExplorerShortcut.exe.. ..........p.../..L..../..L..../...Ykl...>3..f...6I..!7..qL.......Y;...M.HJ\....z....Y?R.B+P...*."......US.R.SB....i.....T.R.....**..3./;/..Q.].{....:s=t.c....|>...%....v:.Ot.....7.....il.rY^..4r.4.Gxl.3Yp...Q....X.".%......B......q..]k..7ae.O.....;..u.n....b..<............ w,.L'O.&...^.OJ...WT.X?RQOx|...}MA.n*.].q:!]iB`....|VW.!.@Br[...N.Xl....f....GH..~..h.......:zZ..'. ..n..._.......Gw../.X...t$$...Z.7...&X...[V.e..p..&z..-Wj.r...ku...VKg.t.5.......,.[.,G........w...}...6.rD.EN.#..uu...kb..5"..gL.>.....D.....N..!...1.o*..j..tD.!....H.X......a...._Fw..SQ~u{...4.to..7a.rrkT[.F.......nkV.....Sqc..f..gW..9Y.'.....L....U....\'=$...h...a...y...).?......Z......Z.l....+.b...O...h^.._..k......l._Q..m....w..s.eGm.=.nP..v57....H.U..6hQ~98z.A.'.z..H&...=.R.6..B'l...h...l....d]%./....<>....~....@..=....7...T0..J;.J....o.[.O..*..P.....'.k.......:.i.Bu.)...P#......^.....Jy.(o..:.?.......]./........
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                      Category:dropped
                                                                                      Size (bytes):506871
                                                                                      Entropy (8bit):7.998074018431883
                                                                                      Encrypted:true
                                                                                      SSDEEP:12288:VCtY2iynJj4iqp1WjsxlD71zFusqzKZXGky4H2po:V+Y1y7qp0oxF7T3ZXGky4Wq
                                                                                      MD5:D52F8AE89AC65F755C28A95C274C1FFE
                                                                                      SHA1:50D581469FF0648EE628A027396F39598995D8B0
                                                                                      SHA-256:2F9A9DFD0C0B0CFAF9C700B4659A4F2F3D11368E6C30A3FA0F93ECDD3B4D2E66
                                                                                      SHA-512:B7B585EED261C262499C73688DFD985818F7869319285168AEEAC1F2CF5FAD487280FCAE1DAC633296E5DB0E0BC454495A09A90C2E37A7E7AF07EF93563503C6
                                                                                      Malicious:false
                                                                                      Preview:PK...........N..UD...."....$.AddWindowsExplorerShortcut.exe.. ..........p.../..L..../..L..../...Ykl...>3..f...6I..!7..qL.......Y;...M.HJ\....z....Y?R.B+P...*."......US.R.SB....i.....T.R.....**..3./;/..Q.].{....:s=t.c....|>...%....v:.Ot.....7.....il.rY^..4r.4.Gxl.3Yp...Q....X.".%......B......q..]k..7ae.O.....;..u.n....b..<............ w,.L'O.&...^.OJ...WT.X?RQOx|...}MA.n*.].q:!]iB`....|VW.!.@Br[...N.Xl....f....GH..~..h.......:zZ..'. ..n..._.......Gw../.X...t$$...Z.7...&X...[V.e..p..&z..-Wj.r...ku...VKg.t.5.......,.[.,G........w...}...6.rD.EN.#..uu...kb..5"..gL.>.....D.....N..!...1.o*..j..tD.!....H.X......a...._Fw..SQ~u{...4.to..7a.rrkT[.F.......nkV.....Sqc..f..gW..9Y.'.....L....U....\'=$...h...a...y...).?......Z......Z.l....+.b...O...h^.._..k......l._Q..m....w..s.eGm.=.nP..v57....H.U..6hQ~98z.A.'.z..H&...=.R.6..B'l...h...l....d]%./....<>....~....@..=....7...T0..J;.J....o.[.O..*..P.....'.k.......:.i.Bu.)...P#......^.....Jy.(o..:.?.......]./........
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):512014
                                                                                      Entropy (8bit):6.566561154468342
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:BNKab1bu1dEpBZvkO4KTYnyA0bFHmufLKNs3gv:rKcozEpbvkOCyA0xGufLKau
                                                                                      MD5:C4A2068C59597175CD1A29F3E7F31BC1
                                                                                      SHA1:89DE0169028E2BDD5F87A51E2251F7364981044D
                                                                                      SHA-256:7AE79F834A4B875A14D63A0DB356EEC1D356F8E64FF9964E458D1C2050E5D180
                                                                                      SHA-512:0989EA9E0EFADF1F6C31E7FC243371BB92BFD1446CF62798DCA38A021FAD8B6ADB0AEABDFBDC5CE8B71FE920E341FC8AB4E906B1839C6E469C75D8148A74A08A
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P/.d...........#...(.l.........................n.........................P............@... ..........................:........... .......................0..L...........................d...........................P............................text....k.......l..................`..`.data................p..............@....rdata...t.......v...r..............@..@/4......L...........................@..@.bss....X................................edata...:.......<...j..............@..@.idata..............................@....CRT....,...........................@....tls................................@....rsrc........ ......................@....reloc..L....0......................@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):126478
                                                                                      Entropy (8bit):6.268811819718352
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:UnNKg6JaJUeHjiaphKMLrn8uexz3TmBUg6xcE:UNcJGGehKMLJBUg6x
                                                                                      MD5:6E93C9C8AADA15890073E74ED8D400C9
                                                                                      SHA1:94757DBD181346C7933694EA7D217B2B7977CC5F
                                                                                      SHA-256:B6E2FA50E0BE319104B05D6A754FE38991E6E1C476951CEE3C7EBDA0DC785E02
                                                                                      SHA-512:A9F71F91961C75BB32871B1EFC58AF1E1710BDE1E39E7958AE9BB2A174E84E0DD32EBAAB9F5AE37275651297D8175EFA0B3379567E0EB0272423B604B4510852
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....^...................p.....m.........................p......f......... .........................{.... ...............................P..............................X........................!...............................text....\.......^..................`.P`.data........p.......b..............@.`..rdata..h&.......(...d..............@.`@/4......\B.......D..................@.0@.bss..................................`..edata..{...........................@.0@.idata....... ......................@.0..CRT....,....0......................@.0..tls.........@......................@.0..reloc.......P......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):845312
                                                                                      Entropy (8bit):6.581151900686739
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:PgQ5Lxf4qcB5SdtFJPAYiXbJ1luVw6DbhJLJbCKShfCtk/8ou/UvfK7hs4I:H5Ng9zK5Puq7hsN
                                                                                      MD5:00C672988C2B0A2CB818F4D382C1BE5D
                                                                                      SHA1:57121C4852B36746146B10B5B97B5A76628F385F
                                                                                      SHA-256:4E9F3E74E984B1C6E4696717AE36396E7504466419D8E4323AF3A89DE2E2B784
                                                                                      SHA-512:C36CAE5057A4D904EBDB5495E086B8429E99116ACBE7D0F09FB66491F57A7FC44232448208044597316A53C7163E18C2F93336B37B302204C8AF6C8F1A9C8353
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2...va.va.va.b..fa.b...a.b..`a.$..ya.$..`a.$..1a.b..ua.va.*a. ...a. ..wa. ...wa.vat.wa. ..wa.Richva.................PE..L......c...........!.................F.......0............................... ......u.....@.......................... ...q..t...(....P.......................`..p.......T...........................8...@............0..D............................text............................... ..`.rdata...i...0...j..................@..@.data...............................@....rsrc........P.......(..............@..@.reloc..p....`......................@..B........................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):648384
                                                                                      Entropy (8bit):6.666474522542094
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:gAQxmcOwzIYhoz/eZz4gOIwEODAAwnq6Nql1:gvmfAI6oz/uOIyDAAwDNql1
                                                                                      MD5:CE7DE939D74321A7D0E9BDF534B89AB9
                                                                                      SHA1:56082B4E09A543562297E098A36AADC3338DEEC5
                                                                                      SHA-256:A9DC70ABB4B59989C63B91755BA6177C491F6B4FE8D0BFBDF21A4CCF431BC939
                                                                                      SHA-512:03C366506481B70E8BF6554727956E0340D27CB2853609D6210472AEDF4B3180C52AAD9152BC2CCCBA005723F5B2E3B5A19D0DCE8B8D1E0897F894A4BFEEFE55
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...".t.........................g.........................0................ ..........................................................,.......=..........................,=.......................................................text....r.......t..................`.P`.data............ ...x..............@.`..rdata..L...........................@.`@/4...................\..............@.0@.bss..................................`..edata...............`..............@.0@.idata...............j..............@.0..CRT....,............v..............@.0..tls.................x..............@.0..reloc...=.......>...z..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):227328
                                                                                      Entropy (8bit):6.641153481093122
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:jtJXnqDMJgH50aKyumLCGTrS4ifbjoO88k:KqgHlKyumLCGTrS4inoZ
                                                                                      MD5:BC824DC1D1417DE0A0E47A30A51428FD
                                                                                      SHA1:C909C48C625488508026C57D1ED75A4AE6A7F9DB
                                                                                      SHA-256:A87AA800F996902F06C735EA44F4F1E47F03274FE714A193C9E13C5D47230FAB
                                                                                      SHA-512:566B5D5DDEA920A31E0FB9E048E28EF2AC149EF075DB44542A46671380F904427AC9A6F59FBC09FE3A4FBB2994F3CAEEE65452FE55804E403CEABC091FFAF670
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...e>.a...........#.........t...V.................e.........................@......1......... .........................#....................................0...............................).......................................................text...............................`.P`.data...............................@.`..rdata..d0.......2..................@.`@.eh_framd@...@...B..................@.0@.bss.....T............................`..edata..#............T..............@.0@.idata...............^..............@.0..CRT....,............d..............@.0..tls......... .......f..............@.0..reloc.......0.......h..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):867854
                                                                                      Entropy (8bit):4.9264497464202694
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:p3y+OSQJZyHHiz8ElQxPpspcQrRclB7OIlJiIoP:xSXyniz1lQxPpspcQrRcLZJi/
                                                                                      MD5:B476CA59D61F11B7C0707A5CF3FE6E89
                                                                                      SHA1:1A1E7C291F963C12C9B46E8ED692104C51389E69
                                                                                      SHA-256:AD65033C0D90C3A283C09C4DB6E2A29EF21BAE59C9A0926820D04EEBBF0BAF6D
                                                                                      SHA-512:D5415AC7616F888DD22560951E90C8A77D5DD355748FDCC3114CAA16E75EB1D65C43696C6AECD2D9FAF8C2D32D5A3EF7A6B8CB6F2C4747C2A82132D29C9ECBFE
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........>.........#.........:....................Xd................................l6........ ......................@..b....P..p................................*..........................L.......................0Q...............................text...D...........................`.P`.data...x...........................@.P..rdata...%.......&..................@.`@/4.......K.......L..................@.0@.bss.........0........................`..edata..b....@......................@.0@.idata..p....P......................@.0..CRT....,....`......................@.0..tls.........p......................@.0..reloc...*.......,..................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):394752
                                                                                      Entropy (8bit):6.662070316214798
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:uAlmRfeS+mOxv8bgDTuXU54l8WybBE36IpuIT9nxQPQnhH/a0CRdWqWJwGKp:zlm0S+SEuXU54NylJIJ9KPQnhilRsVJ
                                                                                      MD5:A4123DE65270C91849FFEB8515A864C4
                                                                                      SHA1:93971C6BB25F3F4D54D4DF6C0C002199A2F84525
                                                                                      SHA-256:43A9928D6604BF604E43C2E1BAB30AE1654B3C26E66475F9488A95D89A4E6113
                                                                                      SHA-512:D0834F7DB31ABA8AA9D97479938DA2D4CD945F76DC2203D60D24C75D29D36E635C2B0D97425027C4DEBA558B8A41A77E288F73263FA9ABC12C54E93510E3D384
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......KL...-d..-d..-d..U...-d..Be..-d.TEe..-d..-e.:-d..Ba..-d..B`..-d..Bg..-d..B`.c-d..Bd..-d..B...-d..Bf..-d.Rich.-d.........................PE..L.....b`...........!.....L..........+S.......`...............................P............@.................................L........... .................... ..\ ..$...............................@...@............`...............................text...NK.......L.................. ..`.rdata......`.......P..............@..@.data...............................@....rsrc... ...........................@..@.reloc..\ ... ..."..................@..B................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):68042
                                                                                      Entropy (8bit):6.090396152400884
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:RX3HAdi7wgCsL6dVSngk2IFm3ZJVRDBLRROBBKRzPm3YRiF+ixh:NHQpe6SnZQLjICPm3Ytib
                                                                                      MD5:5DDA5D34AC6AA5691031FD4241538C82
                                                                                      SHA1:22788C2EBE5D50FF36345EA0CB16035FABAB8A6C
                                                                                      SHA-256:DE1A9DD251E29718176F675455592BC1904086B9235A89E6263A3085DDDCBB63
                                                                                      SHA-512:08385DE11A0943A6F05AC3F8F1E309E1799D28EA50BF1CA6CEB01E128C0CD7518A64E55E8B56A4B8EF9DB3ECD2DE33D39779DCA1FBF21DE735E489A09159A1FD
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........V......#...&...........................d......................................@... ..............................0..t....`..P....................p.......................................................1..H............................text...d...........................`..`.data...L...........................@....rdata..\...........................@..@/4.......2.......4..................@..@.bss.....................................edata..............................@..@.idata..t....0......................@....CRT....0....@......................@....tls.........P......................@....rsrc...P....`......................@....reloc.......p......................@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):123406
                                                                                      Entropy (8bit):6.263889638223575
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:hnPkU1t2P2hHV5JG1YBBAUBEd8+poyez9djcx2/8s6UJqfxX+1XOAhbKzb3+d:xPu21IYyCTToE6c+6e+d
                                                                                      MD5:B49ECFA819479C3DCD97FAE2A8AB6EC6
                                                                                      SHA1:1B8D47D4125028BBB025AAFCA1759DEB3FC0C298
                                                                                      SHA-256:B9D5317E10E49AA9AD8AD738EEBE9ACD360CC5B20E2617E5C0C43740B95FC0F2
                                                                                      SHA-512:18617E57A76EFF6D95A1ED735CE8D5B752F1FB550045FBBEDAC4E8E67062ACD7845ADC6FBE62238C383CED5E01D7AA4AB8F968DC442B67D62D2ED712DB67DC13
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........................R.......d>..........p....@...........................@......^........ ...............................@.4...................................................................................|.@.@............................text....Q.......R..................`.P`.data...\....p.......V..............@.@..rdata...a.......b...X..............@.`@/4..................................@.0@.bss.....c>...........................`..idata..4.....@.....................@.0..CRT....4.....@.....................@.0..tls..........@.....................@.0.................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):562190
                                                                                      Entropy (8bit):6.388293171196564
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:uCtwsqIfrUmUBrusLdVAjA1ATAtuQ8T2Q8TOksqHOuCHWoEuEc4XEmEVEEAcIHAj:uqiIoYmOuNNQ1zU/xGl
                                                                                      MD5:713D04E7396D3A4EFF6BF8BA8B9CB2CD
                                                                                      SHA1:D824F373C219B33988CFA3D4A53E7C2BFA096870
                                                                                      SHA-256:00FB8E819FFDD2C246F0E6C8C3767A08E704812C6443C8D657DFB388AEB27CF9
                                                                                      SHA-512:30311238EF1EE3B97DF92084323A54764D79DED62BFEB12757F4C14F709EB2DBDF6625C260FB47DA2D600E015750394AA914FC0CC40978BA494D860710F9DC40
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Rd...............(..........................@.......................................@... .................................H...........................................................D...........................l............................text...T...........................`..`.data...X...........................@....rdata..H...........................@..@/4......P...........................@..@.bss....t................................idata..H............d..............@....CRT....0............n..............@....tls.................p..............@....rsrc................r..............@....reloc...............x..............@..B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):22542
                                                                                      Entropy (8bit):5.5875455203930615
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:RKAPwPQJgZd3rw0bGMtyz1fiaqmjj1nFY4j70UotV9mRyK:YPQJgZZwUGH1fJljj1+D18
                                                                                      MD5:E1C0147422B8C4DB4FC4C1AD6DD1B6EE
                                                                                      SHA1:4D10C5AD96756CBC530F3C35ADCD9E4B3F467CFA
                                                                                      SHA-256:124F210C04C12D8C6E4224E257D934838567D587E5ABAEA967CBD5F088677049
                                                                                      SHA-512:A163122DFFE729E6F1CA6EB756A776F6F01A784A488E2ACCE63AEAFA14668E8B1148BE948EB4AF4CA8C5980E85E681960B8A43C94B95DFFC72FCCEE1E170BD9A
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........X...............,...T...............@....@.......................................... .................................@...........................................................PU..........................P............................text....+.......,..................`.P`.data........@.......0..............@.`..rdata..0....P.......2..............@.0@/4...........`.......<..............@.0@.bss.........p........................`..idata..@............J..............@.0..CRT....4............T..............@.0..tls.................V..............@.0.................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):15374
                                                                                      Entropy (8bit):5.25938266470983
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:l0HhuwYqkoiCBJRgcsZQPCkWa/HI77wbcRODYCpes2n13dwczbUwS7RE8SD:lqhoqkVCXWgI77B0hGnLwczbUwSC8g
                                                                                      MD5:228EE3AFDCC5F75244C0E25050A346CB
                                                                                      SHA1:822B7674D1B7B091C1478ADD2F88E0892542516F
                                                                                      SHA-256:7ACD537F3BE069C7813DA55D6BC27C3A933DF2CF07D29B4120A8DF0C26D26561
                                                                                      SHA-512:7DFA06B9775A176A9893E362B08DA7F2255037DC99FB6BE53020ECD4841C7E873C03BAC11D14914EFDFE84EFEB3FB99745566BB39784962365BEEBDB89A4531B
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........<.........#.........8...............0....Xj.......................................... ......................p......................................................................P@......................................................text...$...........................`.P`.data...,....0......................@.0..rdata.......@....... ..............@.0@/4...........P......."..............@.0@.bss.........`........................`..edata.......p......................@.0@.idata...............0..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):25614
                                                                                      Entropy (8bit):6.0293046975090325
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:MiksLrrN6mRXYYYYYYYYYYYYYYYYYYYYYYYYYI9W0oM:zrHFYYYYYYYYYYYYYYYYYYYYYYYYY70N
                                                                                      MD5:B82364A204396C352F8CC9B2F8ABEF73
                                                                                      SHA1:20AD466787D65C987A9EBDBD4A2E8845E4D37B68
                                                                                      SHA-256:2A64047F9B9B07F6CB22BFE4F9D4A7DB06994B6107B5EA2A7E38FAFA9E282667
                                                                                      SHA-512:C8CAFA4C315CE96D41AD521E72180DF99931B5F448C8647161E7F9DCA29AA07213B9CCEF9E3F7FB5353C7B459E3DA620E560153BDBA1AB529C206330DBD26FF5
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#....."...`...............@.... g.................................a........ .........................@.......@...............................`............................c.......................................................text.... ......."..................`.P`.data........@.......&..............@.`..rdata.......`.......@..............@.0@/4...........p.......F..............@.0@.bss..................................`..edata..@............T..............@.0@.idata..@............V..............@.0..CRT....,............\..............@.0..tls.................^..............@.0..reloc..`............`..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):15374
                                                                                      Entropy (8bit):5.25938266470983
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:l0HhuwYqkoiCBJRgcsZQPCkWa/HI77wbcRODYCpes2n13dwczbUwS7RE8SD:lqhoqkVCXWgI77B0hGnLwczbUwSC8g
                                                                                      MD5:228EE3AFDCC5F75244C0E25050A346CB
                                                                                      SHA1:822B7674D1B7B091C1478ADD2F88E0892542516F
                                                                                      SHA-256:7ACD537F3BE069C7813DA55D6BC27C3A933DF2CF07D29B4120A8DF0C26D26561
                                                                                      SHA-512:7DFA06B9775A176A9893E362B08DA7F2255037DC99FB6BE53020ECD4841C7E873C03BAC11D14914EFDFE84EFEB3FB99745566BB39784962365BEEBDB89A4531B
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........<.........#.........8...............0....Xj.......................................... ......................p......................................................................P@......................................................text...$...........................`.P`.data...,....0......................@.0..rdata.......@....... ..............@.0@/4...........P......."..............@.0@.bss.........`........................`..edata.......p......................@.0@.idata...............0..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):25614
                                                                                      Entropy (8bit):6.0293046975090325
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:MiksLrrN6mRXYYYYYYYYYYYYYYYYYYYYYYYYYI9W0oM:zrHFYYYYYYYYYYYYYYYYYYYYYYYYY70N
                                                                                      MD5:B82364A204396C352F8CC9B2F8ABEF73
                                                                                      SHA1:20AD466787D65C987A9EBDBD4A2E8845E4D37B68
                                                                                      SHA-256:2A64047F9B9B07F6CB22BFE4F9D4A7DB06994B6107B5EA2A7E38FAFA9E282667
                                                                                      SHA-512:C8CAFA4C315CE96D41AD521E72180DF99931B5F448C8647161E7F9DCA29AA07213B9CCEF9E3F7FB5353C7B459E3DA620E560153BDBA1AB529C206330DBD26FF5
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#....."...`...............@.... g.................................a........ .........................@.......@...............................`............................c.......................................................text.... ......."..................`.P`.data........@.......&..............@.`..rdata.......`.......@..............@.0@/4...........p.......F..............@.0@.bss..................................`..edata..@............T..............@.0@.idata..@............V..............@.0..CRT....,............\..............@.0..tls.................^..............@.0..reloc..`............`..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):43520
                                                                                      Entropy (8bit):6.232860260916194
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:XozEJVjDF38DrOPwLg0cAY7K+k+Y+TyHMjMbHVJx9jm3LkkteFfXbBekdAnPKx:Xo4JJDirOoLg0C7F/rDGdpB52PK
                                                                                      MD5:B162992412E08888456AE13BA8BD3D90
                                                                                      SHA1:095FA02EB14FD4BD6EA06F112FDAFE97522F9888
                                                                                      SHA-256:2581A6BCA6F4B307658B24A7584A6B300C91E32F2FE06EB1DCA00ADCE60FA723
                                                                                      SHA-512:078594DE66F7E065DCB48DA7C13A6A15F8516800D5CEE14BA267F43DC73BC38779A4A4ED9444AFDFA581523392CBE06B0241AA8EC0148E6BCEA8E23B78486824
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....z.......D................,n.........................p.......`........ ...................... .......0...............................`..............................t........................0...............................text....x.......z..................`.P`.data...,............~..............@.0..rdata..............................@.P@.eh_fram|...........................@.0@.bss.....B............................`..edata....... ......................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.........P......................@.0..reloc.......`......................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):240654
                                                                                      Entropy (8bit):6.518503846592995
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:yZDfF4DjzIHBV+bUeenu+t+oSTdjpNZ7utS81qpHW4paP2L:ekjzMBVKXeuq+oSTdjpr7N8f+L
                                                                                      MD5:4F0C85351AEC4B00300451424DB4B5A4
                                                                                      SHA1:BB66D807EDE0D7D86438207EB850F50126924C9D
                                                                                      SHA-256:CC0B53969670C7275A855557EA16182C932160BC0F8543EFFC570F760AE2185E
                                                                                      SHA-512:80C84403ED47380FF75EBA50A23E565F7E5C68C7BE8C208A5A48B7FB0798FF51F3D33780C902A6F8AB0E6DB328860C071C77B93AC88CADF84FEF7DF34DE3E2DA
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....H...................`.....g.................................\........ .........................o.......\...............................t............................S.......................................................text...dF.......H..................`.P`.data...X....`.......L..............@.P..rdata.......p.......N..............@.`@/4.......<.......>...T..............@.0@.bss..................................`..edata..o...........................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls................................@.0..reloc..t...........................@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):852754
                                                                                      Entropy (8bit):6.503318968423685
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:fpFFQV+FKJ37Dm+yY4pBkPr2v2meLaoHN/oBrZ3ixdnGVzpJXm/iN:fpnzFw37iDYIBkzuPcHNgrZ3uGVzm/iN
                                                                                      MD5:07FB6D31F37FB1B4164BEF301306C288
                                                                                      SHA1:4CB41AF6D63A07324EF6B18B1A1F43CE94E25626
                                                                                      SHA-256:06DDF0A370AF00D994824605A8E1307BA138F89B2D864539F0D19E8804EDAC02
                                                                                      SHA-512:CAB4A7C5805B80851ABA5F2C9B001FABC1416F6648D891F49EACC81FE79287C5BAA01306A42298DA722750B812A4EA85388FFAE9200DCF656DD1D5B5B9323353
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L..Y.,..v......!......... .....................a................................O}........ ......................................@.......................P..X0...........................0.......................................................text...............................`.P`.data...............................@.`..rdata..............................@.`@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,.... ......................@.0..tls.... ....0......................@.0..rsrc........@......................@.0..reloc..X0...P...2..................@.0B/4...................&..............@.@B/19.................*..............@..B/31..........@......................@..B/45..........`......................@..B/57.................................@.0B/70.....i...............
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):112640
                                                                                      Entropy (8bit):6.540227486061059
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:45vq1zsdXYjZmGz9anu3MwjLA/eeiUKJP3Djl23HTKJ7WMU3lPyK+ZSrKxV/UJ9G:vzMMg/gMKeGsMIl6K+Zvry5zNY
                                                                                      MD5:BDB65DCE335AC29ECCBC2CA7A7AD36B7
                                                                                      SHA1:CE7678DCF7AF0DBF9649B660DB63DB87325E6F69
                                                                                      SHA-256:7EC9EE07BFD67150D1BC26158000436B63CA8DBB2623095C049E06091FA374C3
                                                                                      SHA-512:8AABCA6BE47A365ACD28DF8224F9B9B5E1654F67E825719286697FB9E1B75478DDDF31671E3921F06632EED5BB3DDA91D81E48D4550C2DCD8E2404D566F1BC29
                                                                                      Malicious:false
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................f...N......0u............@.....................................................................2.......v...............................h...................................................................................CODE....Pe.......f.................. ..`DATA....D............j..............@...BSS......................................idata..v...........................@....edata..2...........................@..P.reloc..h...........................@..P.rsrc...............................@..P....................................@..P................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):772608
                                                                                      Entropy (8bit):6.546391052615969
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:Q75mFL0MNnM/SQdtij4UujFhGiNV1SckT3wio2L2jV6EfnQ29mwF3s4iGtInw1m8:AwN0e0lN1fnQUFccGns9ukS6
                                                                                      MD5:B3B487FC3832B607A853211E8AC42CAD
                                                                                      SHA1:06E32C28103D33DAD53BE06C894203F8808D38C1
                                                                                      SHA-256:30BC10BD6E5B2DB1ACE93C2004E24C128D20C242063D4F0889FD3FB3E284A9E4
                                                                                      SHA-512:FA6BDBA4F2A0CF4CCA40A333B69FD041D9EDC0736EDA206F17F10AF5505CC4688B0401A3CAD2D2F69392E752B8877DB593C7872BCDB133DC785A200FF38598BB
                                                                                      Malicious:false
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....1.d.................D..........$].......`....@.......................................@......@...................0..o............p...(...................`...............................P......................X........ .......................text...h4.......6.................. ..`.itext.......P.......:.............. ..`.data....7...`...8...H..............@....bss....0i...............................idata..............................@....didata...... ......................@....edata..o....0......................@..@.tls.........@...........................rdata..]....P......................@..@.reloc.......`......................@..B.rsrc....(...p...(..................@..@....................................@..@................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):294926
                                                                                      Entropy (8bit):6.191604766067493
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:7E0FFjiAeF21pLQFgK33duKMnlCj3eWyNg2hlNvFXl8rzJjjOjVmdX566Uwqwqwm:wKFX3LygKjjN2HIfpruwqwqwFUgVE
                                                                                      MD5:C76C9AE552E4CE69E3EB9EC380BC0A42
                                                                                      SHA1:EFFEC2973C3D678441AF76CFAA55E781271BD1FB
                                                                                      SHA-256:574595B5FD6223E4A004FA85CBB3588C18CC6B83BF3140D8F94C83D11DBCA7BD
                                                                                      SHA-512:7FB385227E802A0C77749978831245235CD1343B95D97E610D20FB0454241C465387BCCB937A2EE8A2E0B461DD3D2834F7F542E7739D8E428E146F378A24EE97
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.........|.....................n.................................c........ ......................`..j7...........................................................................................................................text...8...........................`.P`.data...x...........................@.0..rdata...F.......H..................@.`@/4.......U.......V..................@.0@.bss.........P........................`..edata..j7...`...8...$..............@.0@.idata...............\..............@.0..CRT....,............b..............@.0..tls.................d..............@.0..reloc...............f..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):13838
                                                                                      Entropy (8bit):5.173769974589746
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:oh3ZZBe9xz7rdz9Us5bsRuKUYDpesWAhQqCNhNXUwS7RuLH9+E:ohLBe3dz9UsikKDGZqCNhNXUwS4bcE
                                                                                      MD5:9C55B3E5ED1365E82AE9D5DA3EAEC9F2
                                                                                      SHA1:BB3D30805A84C6F0803BE549C070F21C735E10A9
                                                                                      SHA-256:D2E374DF7122C0676B4618AED537DFC8A7B5714B75D362BFBE85B38F47E3D4A4
                                                                                      SHA-512:EEFE8793309FDC801B1649661B0C17C38406A9DAA1E12959CD20344975747D470D6D9C8BE51A46279A42FE1843C254C432938981D108F4899B93CDD744B5D968
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........6.........#.........2...............0....@m.................................Z........ ......................p..J.......h............................................................@......................................................text...............................`.P`.data...,....0......................@.0..rdata.......@......................@.0@/4...........P......................@.0@.bss.........`........................`..edata..J....p.......(..............@.0@.idata..h............*..............@.0..CRT....,............0..............@.0..tls.................2..............@.0..reloc...............4..............@.0B................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):258560
                                                                                      Entropy (8bit):6.491223412910377
                                                                                      Encrypted:false
                                                                                      SSDEEP:6144:X+FRYMGwNozw5upAagZnb80OXrGSc+w9nI7ZMcyVhk233M:SGMGbw5upAagZb80SMXzkgM
                                                                                      MD5:DB191B89F4D015B1B9AEE99AC78A7E65
                                                                                      SHA1:8DAC370768E7480481300DD5EBF8BA9CE36E11E3
                                                                                      SHA-256:38A75F86DB58EB8D2A7C0213861860A64833C78F59EFF19141FFD6C3B6E28835
                                                                                      SHA-512:A27E26962B43BA84A5A82238556D06672DCF17931F866D24E6E8DCE88F7B30E80BA38B071943B407A7F150A57CF1DA13D2137C235B902405BEDBE229B6D03784
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.j..f...f...f..]....f..]...f..]....f......f......f......f......f..]....f...f..]f......f......f......f...f...f......f..Rich.f..........PE..L...y.._...........!................@........ ...............................@..........................................d...$...(.......h.................... ......................................(...@............ ..8............................text...q........................... ..`asmcode.>$.......&.................. ..`.rdata..B.... ......................@..@.data...............................@....rsrc...h...........................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):714526
                                                                                      Entropy (8bit):6.506139406526691
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:sRObekMSkfohrPUs37uzHnA6zg5cI5MpAHERDjrNyTeR0oUGOHtraxDExycp:uObekrkfohrP337uzHnA6cH+iHEOWUGM
                                                                                      MD5:6F83B75DC615A17D4BFEBDDB6CA68EA9
                                                                                      SHA1:34434D397A034221560B8FD32B6612F6EDCC53B6
                                                                                      SHA-256:0319BA5EEC8A403D2C8589A420BDED11B9194AC4DA5A9CA021C82EE3BC3A3797
                                                                                      SHA-512:FA76EF0687952DD12B3E9899C6978E8B670BF34E4FB1144256557DCDF2187CF799F49D0D0B3E04019EE478A37ED1283B2A4CEDF2900B60A938938A412ADBC7A2
                                                                                      Malicious:false
                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................d...........p............@..............................................@...............................%..................................................................................................................CODE....(c.......d.................. ..`DATA.................h..............@...BSS..................z...................idata...%.......&...z..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc...............................@..P.....................H..............@..P........................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):3100139
                                                                                      Entropy (8bit):6.83234863403202
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:WJ7BVlCPYxwR4ebO8z+mzgamUfwYRLRG5e2nnaV0ciqxA:WJN3CwmR2W1MUfx4DaV0H
                                                                                      MD5:D4AC26CDD6A99BB7D32EA5481D4EF6A2
                                                                                      SHA1:42A0895C486C87DDC6B9A95B584BB791960B48BE
                                                                                      SHA-256:3BEFE9881E3CD286696EE5D56FB85B3CFDFA44F86E2EC1902CC245D31A2C7DD6
                                                                                      SHA-512:93D1635986ED0C282A2B763DAF60568844E15B1B87D36285F8DDDBB8108396D165A5F3211522B7E97F1F2B1EEF6E8378B4E8727F4517DA03BE285DFAFD20A7AD
                                                                                      Malicious:false
                                                                                      Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................2......2............o...2......2......2.....Rich...........PE..L.... .e.............................7............@.........................../.............................................|.......................................................................P...@............................................text.............................. ..`.rdata...(.......0..................@..@.data....6..........................@....rsrc...............................@..@.art.....`... ...]..................`...................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:modified
                                                                                      Size (bytes):3100139
                                                                                      Entropy (8bit):6.832348531042502
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:VJ7BVlCPYxwR4ebO8z+mzgamUfwYRLRG5e2nnaV0ciqxA:VJN3CwmR2W1MUfx4DaV0H
                                                                                      MD5:888978F67B26DD0DBAB1EE1972A21E61
                                                                                      SHA1:DFFE40BA006CB04520263DC3787420B39C1DA101
                                                                                      SHA-256:B2C25ACA30ED689C236B38FDAC6D07A2A979EA6EFA4A3DF831736626F928D78D
                                                                                      SHA-512:DD32A51781816722A6FB0F4D76D517EE2E9E07C2A421255C09C83C8E7340478716D995E3D8E84B0A54FEE5D6DA0C160BDE67E1BBA0B5753B84CDC0763CBD9711
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................2......2............o...2......2......2.....Rich...........PE..L.... .e.............................7............@.........................../.............................................|.......................................................................P...@............................................text.............................. ..`.rdata...(.......0..................@..@.data....6..........................@....rsrc...............................@..@.art.....`... ...]..................`...................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:IFF data
                                                                                      Category:dropped
                                                                                      Size (bytes):1716
                                                                                      Entropy (8bit):4.781797138644031
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:wSXqInX3C5DMDxJWyjPTw2C4F0lB6v4AnFt+cUeC1/B0vFFNgpX27:wSacX3ChMDxPpulB6gAFHSJE6X27
                                                                                      MD5:257D1BF38FA7859FFC3717EF36577C04
                                                                                      SHA1:A9D2606CFC35E17108D7C079A355A4DB54C7C2EE
                                                                                      SHA-256:DFACC2F208EBF6D6180EE6E882117C31BB58E8B6A76A26FB07AC4F40E245A0CB
                                                                                      SHA-512:E13A6F489C9C5BA840502F73ACD152D366E0CCDD9D3D8E74B65FF89FDC70CD46F52E42EEE0B4BA9F151323EC07C4168CF82446334564ADAA8666624F7B8035F3
                                                                                      Malicious:false
                                                                                      Preview:FORMAT controls the output. Interpreted sequences are:.. %% a literal %. %a locale's abbreviated weekday name (e.g., Sun). %A locale's full weekday name (e.g., Sunday). %b locale's abbreviated month name (e.g., Jan). %B locale's full month name (e.g., January). %c locale's date and time (e.g., Thu Mar 3 23:05:25 2005). %C century; like %Y, except omit last two digits (e.g., 20). %d day of month (e.g., 01). %D date; same as %m/%d/%y. %e day of month, space padded; same as %_d. %F full date; same as %Y-%m-%d. %g last two digits of year of ISO week number (see %G). %G year of ISO week number (see %V); normally useful only with %V. %h same as %b. %H hour (00..23). %I hour (01..12). %j day of year (001..366). %k hour, space padded ( 0..23); same as %_H. %l hour, space padded ( 1..12); same as %_I. %m month (01..12). %M minute (00..59). %n a newline. %N nanoseconds (000000000..999999999). %p locale's equivalent of eith
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1825
                                                                                      Entropy (8bit):5.088030483893024
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:ZhIPjdbiNJQ387Udf9NpHjjY2S7AJYazRMiZMjYzMX2OP5usmC2ZxJnIBVjYHwZ2:vg79lS7sbtujNfuvlXJEVjH4O2
                                                                                      MD5:992C00BEAB194CE392117BB419F53051
                                                                                      SHA1:8F9114C95E2A2C9F9C65B9243D941DCB5CEA40DE
                                                                                      SHA-256:9E35C8E29CA055CE344E4C206E7B8FF1736158D0B47BF7B3DBC362F7EC7E722C
                                                                                      SHA-512:FACDCA78AE7D874300EACBE3014A9E39868C93493B9CD44AAE1AB39AFA4D2E0868E167BCA34F8C445AA7CCC9DDB27E1B607D739AF94AA4840789A3F01E7BED9D
                                                                                      Malicious:false
                                                                                      Preview:.# Tag replace definition..# ..# Values must be put into sections...# The following section names are supported:..#..# [*] is for all tags, i.e. values specified under this section will be replace in all tags..# Following tag-specific identifiers can be used. Values will be replaced only in specified tag...# [Conductor]..# [Date]..# [Publisher]..# [Lyrics]..# [Flags]..# [ISRC]..# [Title]..# [Catalog]..# [Year]..# [Genre]..# [Artist]..# [Album]..# [DiscId]..# [BPM]..# [Album Artist]..# [Composer]..# [Content Group]..# [Compilation]..# [Disc]..# [Track]..# [Comments]..# [Encoded by]..#..# Format is <value from>=<value to>..# where <value from> is case-sensitive value, which will be replaced..# with <value to>, which is RegEx expression...#..# If you want to do a case insensitive replacement, add ! to the name of the section ..#..# Those are specific value, which can be used as <value from>:..#..# <NULL> is used to specify empty tag as well as empty value, e.g. ..# [Comments]..# <ANY>=<
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:IFF data
                                                                                      Category:dropped
                                                                                      Size (bytes):1716
                                                                                      Entropy (8bit):4.781797138644031
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:wSXqInX3C5DMDxJWyjPTw2C4F0lB6v4AnFt+cUeC1/B0vFFNgpX27:wSacX3ChMDxPpulB6gAFHSJE6X27
                                                                                      MD5:257D1BF38FA7859FFC3717EF36577C04
                                                                                      SHA1:A9D2606CFC35E17108D7C079A355A4DB54C7C2EE
                                                                                      SHA-256:DFACC2F208EBF6D6180EE6E882117C31BB58E8B6A76A26FB07AC4F40E245A0CB
                                                                                      SHA-512:E13A6F489C9C5BA840502F73ACD152D366E0CCDD9D3D8E74B65FF89FDC70CD46F52E42EEE0B4BA9F151323EC07C4168CF82446334564ADAA8666624F7B8035F3
                                                                                      Malicious:false
                                                                                      Preview:FORMAT controls the output. Interpreted sequences are:.. %% a literal %. %a locale's abbreviated weekday name (e.g., Sun). %A locale's full weekday name (e.g., Sunday). %b locale's abbreviated month name (e.g., Jan). %B locale's full month name (e.g., January). %c locale's date and time (e.g., Thu Mar 3 23:05:25 2005). %C century; like %Y, except omit last two digits (e.g., 20). %d day of month (e.g., 01). %D date; same as %m/%d/%y. %e day of month, space padded; same as %_d. %F full date; same as %Y-%m-%d. %g last two digits of year of ISO week number (see %G). %G year of ISO week number (see %V); normally useful only with %V. %h same as %b. %H hour (00..23). %I hour (01..12). %j day of year (001..366). %k hour, space padded ( 0..23); same as %_H. %l hour, space padded ( 1..12); same as %_I. %m month (01..12). %M minute (00..59). %n a newline. %N nanoseconds (000000000..999999999). %p locale's equivalent of eith
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1825
                                                                                      Entropy (8bit):5.088030483893024
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:ZhIPjdbiNJQ387Udf9NpHjjY2S7AJYazRMiZMjYzMX2OP5usmC2ZxJnIBVjYHwZ2:vg79lS7sbtujNfuvlXJEVjH4O2
                                                                                      MD5:992C00BEAB194CE392117BB419F53051
                                                                                      SHA1:8F9114C95E2A2C9F9C65B9243D941DCB5CEA40DE
                                                                                      SHA-256:9E35C8E29CA055CE344E4C206E7B8FF1736158D0B47BF7B3DBC362F7EC7E722C
                                                                                      SHA-512:FACDCA78AE7D874300EACBE3014A9E39868C93493B9CD44AAE1AB39AFA4D2E0868E167BCA34F8C445AA7CCC9DDB27E1B607D739AF94AA4840789A3F01E7BED9D
                                                                                      Malicious:false
                                                                                      Preview:.# Tag replace definition..# ..# Values must be put into sections...# The following section names are supported:..#..# [*] is for all tags, i.e. values specified under this section will be replace in all tags..# Following tag-specific identifiers can be used. Values will be replaced only in specified tag...# [Conductor]..# [Date]..# [Publisher]..# [Lyrics]..# [Flags]..# [ISRC]..# [Title]..# [Catalog]..# [Year]..# [Genre]..# [Artist]..# [Album]..# [DiscId]..# [BPM]..# [Album Artist]..# [Composer]..# [Content Group]..# [Compilation]..# [Disc]..# [Track]..# [Comments]..# [Encoded by]..#..# Format is <value from>=<value to>..# where <value from> is case-sensitive value, which will be replaced..# with <value to>, which is RegEx expression...#..# If you want to do a case insensitive replacement, add ! to the name of the section ..#..# Those are specific value, which can be used as <value from>:..#..# <NULL> is used to specify empty tag as well as empty value, e.g. ..# [Comments]..# <ANY>=<
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:IFF data
                                                                                      Category:dropped
                                                                                      Size (bytes):1716
                                                                                      Entropy (8bit):4.781797138644031
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:wSXqInX3C5DMDxJWyjPTw2C4F0lB6v4AnFt+cUeC1/B0vFFNgpX27:wSacX3ChMDxPpulB6gAFHSJE6X27
                                                                                      MD5:257D1BF38FA7859FFC3717EF36577C04
                                                                                      SHA1:A9D2606CFC35E17108D7C079A355A4DB54C7C2EE
                                                                                      SHA-256:DFACC2F208EBF6D6180EE6E882117C31BB58E8B6A76A26FB07AC4F40E245A0CB
                                                                                      SHA-512:E13A6F489C9C5BA840502F73ACD152D366E0CCDD9D3D8E74B65FF89FDC70CD46F52E42EEE0B4BA9F151323EC07C4168CF82446334564ADAA8666624F7B8035F3
                                                                                      Malicious:false
                                                                                      Preview:FORMAT controls the output. Interpreted sequences are:.. %% a literal %. %a locale's abbreviated weekday name (e.g., Sun). %A locale's full weekday name (e.g., Sunday). %b locale's abbreviated month name (e.g., Jan). %B locale's full month name (e.g., January). %c locale's date and time (e.g., Thu Mar 3 23:05:25 2005). %C century; like %Y, except omit last two digits (e.g., 20). %d day of month (e.g., 01). %D date; same as %m/%d/%y. %e day of month, space padded; same as %_d. %F full date; same as %Y-%m-%d. %g last two digits of year of ISO week number (see %G). %G year of ISO week number (see %V); normally useful only with %V. %h same as %b. %H hour (00..23). %I hour (01..12). %j day of year (001..366). %k hour, space padded ( 0..23); same as %_H. %l hour, space padded ( 1..12); same as %_I. %m month (01..12). %M minute (00..59). %n a newline. %N nanoseconds (000000000..999999999). %p locale's equivalent of eith
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1825
                                                                                      Entropy (8bit):5.088030483893024
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:ZhIPjdbiNJQ387Udf9NpHjjY2S7AJYazRMiZMjYzMX2OP5usmC2ZxJnIBVjYHwZ2:vg79lS7sbtujNfuvlXJEVjH4O2
                                                                                      MD5:992C00BEAB194CE392117BB419F53051
                                                                                      SHA1:8F9114C95E2A2C9F9C65B9243D941DCB5CEA40DE
                                                                                      SHA-256:9E35C8E29CA055CE344E4C206E7B8FF1736158D0B47BF7B3DBC362F7EC7E722C
                                                                                      SHA-512:FACDCA78AE7D874300EACBE3014A9E39868C93493B9CD44AAE1AB39AFA4D2E0868E167BCA34F8C445AA7CCC9DDB27E1B607D739AF94AA4840789A3F01E7BED9D
                                                                                      Malicious:false
                                                                                      Preview:.# Tag replace definition..# ..# Values must be put into sections...# The following section names are supported:..#..# [*] is for all tags, i.e. values specified under this section will be replace in all tags..# Following tag-specific identifiers can be used. Values will be replaced only in specified tag...# [Conductor]..# [Date]..# [Publisher]..# [Lyrics]..# [Flags]..# [ISRC]..# [Title]..# [Catalog]..# [Year]..# [Genre]..# [Artist]..# [Album]..# [DiscId]..# [BPM]..# [Album Artist]..# [Composer]..# [Content Group]..# [Compilation]..# [Disc]..# [Track]..# [Comments]..# [Encoded by]..#..# Format is <value from>=<value to>..# where <value from> is case-sensitive value, which will be replaced..# with <value to>, which is RegEx expression...#..# If you want to do a case insensitive replacement, add ! to the name of the section ..#..# Those are specific value, which can be used as <value from>:..#..# <NULL> is used to specify empty tag as well as empty value, e.g. ..# [Comments]..# <ANY>=<
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:InnoSetup Log RButtonTRAY, version 0x30, 7967 bytes, 992547\user, "C:\Program Files (x86)\RButtonTRAY"
                                                                                      Category:dropped
                                                                                      Size (bytes):7967
                                                                                      Entropy (8bit):5.1155150139242345
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:GbN8WHNpNpK+T4hlOIhcQ4cVSQs0LnzHIVykQFlC:GZ8WHNpJ+QIh+cVSQ1nct4C
                                                                                      MD5:453567084842EF4D42FD944097225691
                                                                                      SHA1:AD30E897A7A154686D6958ED70522E643C1A4446
                                                                                      SHA-256:ABB6FFED538C1612BEED62C22C85005B9A5788D8A84A0883A7DF84AA7FE2A206
                                                                                      SHA-512:37D2BDE2D285101582FA1E59B37DD74165A4BA88A1EA7ABCDBFEB7E9A752BC1EB0C8D7E28C529E62682C318A3C9ABBFA0DBC9B2B98F45C43E0ACFB9EC383CEFD
                                                                                      Malicious:false
                                                                                      Preview:Inno Setup Uninstall Log (b)....................................RButtonTRAY.....................................................................................................................RButtonTRAY.....................................................................................................................0...B.......%................................................................................................................7m...................F....992547.user"C:\Program Files (x86)\RButtonTRAY...............,.. ..........j.IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...............................o...........!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User32.dll.GetSy
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):714526
                                                                                      Entropy (8bit):6.506139406526691
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:sRObekMSkfohrPUs37uzHnA6zg5cI5MpAHERDjrNyTeR0oUGOHtraxDExycp:uObekrkfohrP337uzHnA6cH+iHEOWUGM
                                                                                      MD5:6F83B75DC615A17D4BFEBDDB6CA68EA9
                                                                                      SHA1:34434D397A034221560B8FD32B6612F6EDCC53B6
                                                                                      SHA-256:0319BA5EEC8A403D2C8589A420BDED11B9194AC4DA5A9CA021C82EE3BC3A3797
                                                                                      SHA-512:FA76EF0687952DD12B3E9899C6978E8B670BF34E4FB1144256557DCDF2187CF799F49D0D0B3E04019EE478A37ED1283B2A4CEDF2900B60A938938A412ADBC7A2
                                                                                      Malicious:false
                                                                                      Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................d...........p............@..............................................@...............................%..................................................................................................................CODE....(c.......d.................. ..`DATA.................h..............@...BSS..................z...................idata...%.......&...z..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc...............................@..P.....................H..............@..P........................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2017792
                                                                                      Entropy (8bit):7.882413889771764
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:itCW0MSJfxkfBNec7L3jdHWNefneKAIBvxlRF1E:itz0MiOfbD79HWNeeKDtn1
                                                                                      MD5:EE1049D8F8248D11080582FE27F96843
                                                                                      SHA1:6701BA82ECE6878C61FCE5204DEF8EFDC28822AB
                                                                                      SHA-256:F3C70EC32049139737226C85A87D453AC98C6A0FFC7747BA4F65118A1B8EF670
                                                                                      SHA-512:F8DB9E2E7E0DEC1F95B83E52F67B15C0E93FCBA0801D220DB43C23D732A2BB298E986FD65493019F3FED9BBC840032FF5F5C9AE3DF6A025C596622B34757DEA6
                                                                                      Malicious:true
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................................PE..L......c.............................Y....... ....@..........................@.......u..........................................<....@...............................................................4..@............................................text............................... ..`.data........ ......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):4096
                                                                                      Entropy (8bit):1.1997496453712269
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4Nqj2xX/7EjAk56GWtbgjO3s7Nxk56G9lF0YWYzF3:4vhGtm2jGtH6YWYh3
                                                                                      MD5:7A82FEE6FE4D8D0552FF062D8314888E
                                                                                      SHA1:9E2986EAC350D3DB60ED1A7EC07C259E74435E58
                                                                                      SHA-256:F4CA594F5F8B06646EA728AC4DCDD4E818B2B974FD1E10ECEEED2A1092AAC2CA
                                                                                      SHA-512:887F8DDA5569B3461071A6439882C20EB3412E94F0C4DEE97A67572F7EE8BC291DEAB265930C017084C170BDE122186BF778980AE8F5E5C944CC629B60777733
                                                                                      Malicious:false
                                                                                      Preview:............................................................................D................4..................eJ..............Zb..K....(..........................................@.t.z.r.e.s...d.l.l.,.-.3.2.2.......................................................@.t.z.r.e.s...d.l.l.,.-.3.2.1...............................................................P................4..........U.p.d.a.t.e.S.e.s.s.i.o.n.O.r.c.h.e.s.t.r.a.t.i.o.n...C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.U.S.O.S.h.a.r.e.d.\.L.o.g.s.\.S.y.s.t.e.m.\.U.p.d.a.t.e.S.e.s.s.i.o.n.O.r.c.h.e.s.t.r.a.t.i.o.n...a.7.d.8.5.3.5.e.-.a.2.b.b.-.4.0.8.d.-.9.2.6.4.-.f.5.5.8.8.5.5.a.8.2.c.9...1...e.t.l...........P.P..............4..................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                      File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):999
                                                                                      Entropy (8bit):4.966299883488245
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:Jd4T7gw4TchTGBLtKEHcHGuDyeHRuDye6MGFiP6euDyRtz:34T53VGLv8HGuDyeHRuDye6MGFiP6euy
                                                                                      MD5:24567B9212F806F6E3E27CDEB07728C0
                                                                                      SHA1:371AE77042FFF52327BF4B929495D5603404107D
                                                                                      SHA-256:82F352AD3C9B3E58ECD3207EDC38D5F01B14D968DA908406BD60FD93230B69F6
                                                                                      SHA-512:5D5E65FCD9061DADC760C9B3124547F2BABEB49FD56A2FD2FE2AD2211A1CB15436DB24308A0B5A87DA24EC6AB2A9B0C5242D828BE85BD1B2683F9468CE310904
                                                                                      Malicious:false
                                                                                      Preview:.<?xml version="1.0" encoding="utf-8"?>..<software_identification_tag xmlns="http://standards.iso.org/iso/19770/-2/2009/schema.xsd">...<entitlement_required_indicator>true</entitlement_required_indicator>...<product_title>Windows 10 Pro</product_title>...<product_version>....<name>10.0.19041.1865</name>....<numeric>.....<major>10</major>.....<minor>0</minor>.....<build>19041</build>.....<review>1865</review>....</numeric>...</product_version>...<software_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_creator>...<software_licensor>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</software_licensor>...<software_id>....<unique_id>Windows-10-Pro</unique_id>....<tag_creator_regid>regid.1991-06.com.microsoft</tag_creator_regid>...</software_id>...<tag_creator>....<name>Microsoft Corporation</name>....<regid>regid.1991-06.com.microsoft</regid>...</tag_creator>..</software_identification_tag>..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):20852
                                                                                      Entropy (8bit):6.05147791645295
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:cMY4QkV6icO1hMtqFU4WGYgVVdz31hiyd4AW9V9hC1hIhb50IU4mV91h5c2q48XE:6BkoicOaq6ddgV/T+yrqvUgb+3jnt8nE
                                                                                      MD5:8C124D1E48874E7D874E44FD7B676C52
                                                                                      SHA1:78908B001070D281168BA55A83C6F56193BAF94E
                                                                                      SHA-256:2F2168B2C707A21B00468DA70DE567D8F5A3974ADE5C382D5EE242D308BF7680
                                                                                      SHA-512:0F0B21B0FB595BC3690C60CBF252FB06DEC1CADD4FA775E7A9B8A837DAF028AAEFB20866AC2AB9F07C0DE093B0B273D2601D9448E82C75329BBA44F08EB8209A
                                                                                      Malicious:false
                                                                                      Preview:dir-key-certificate-version 3..fingerprint 0232AF901C31A04EE9848595AF9BB7620D4C5B2E..dir-key-published 2023-05-17 14:30:40..dir-key-expires 2024-05-17 14:30:40..dir-identity-key..-----BEGIN RSA PUBLIC KEY-----..MIIBigKCAYEAu9O0Pueesn0+29BlxZs60mBqehjdQtgSnKOm9QZxbQ0xrMQgbFnR..hWbKD8erenyeFk2SF6AJkbyzgYC89hyPW+8GBDmg5bE8fRKjgV/nI3tY2m4rkY3u..zSmYIdwqHUUc98Xzt9PaQ8IJAlDBY4XLKrWmJMxSyhBlVEept7+9Tj23qowW44Mz..xPJZ1aFkB1FpkD6qmoCzVZbhXy3cGt1nDwdJK7KqlaXziz9pFiw8PzTVU2xFgJNy..+nEcT72DBtk3G5K2Riu/aXY/D541Cioj9KMV4Nv4g8aBKx58Xq2tq1pFkc1Bqj1y..2MomVR3iskFzlqC8yKWGVe4OP2IaOhtcQJYp5GR9q+dWnr53WWNVxNu3sA9iMal3..PJUk5pIYrsmArGew5gmlCe+Al46nPINxc7ouztmStAV+2F6SpZlKOcstnT+KJ52O..1xnOSaj/WnzG2o4KZ9UrFQoUNOLQJcelPcC+vrinMk9BQPcB072l9NjpUBC9brsW..qTCMStn1jfDDAgMBAAE=..-----END RSA PUBLIC KEY-----..dir-signing-key..-----BEGIN RSA PUBLIC KEY-----..MIIBCgKCAQEAvIW/KEA4eoi2rkD6vDKcLu2+2DY5K3pd9P5edSvQ8mBY21CeUfhY..WI+XWr1K9U5/yNsJS8YCvGEtvNK+yEnHkBKLItvi6ibv6W8nP5l4sLhooJBaPm7v..FDhtbnp6HTMbSnBXTxT2gaSPJ+p9
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:ASCII text, with very long lines (1006)
                                                                                      Category:dropped
                                                                                      Size (bytes):2866955
                                                                                      Entropy (8bit):5.611525243321319
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:WyaXTZ4ocEo0u5q8yAfBZCMP1XNyaM0JzRhu5vcU3w5UKw2kkOOMo8Geu9kQWgZD:WPTuom15hfFXNyj0JqOl5LbOJSkQWgN
                                                                                      MD5:C69CD766EDF22E9397A95076EDBA4FE2
                                                                                      SHA1:4BE4797A60846E50DE33101ABF6EBE73C77508B7
                                                                                      SHA-256:6EF328292CAFCCD717BAC3F869B13BF327FF109AAD9344BEAD7BEC09BA8435C4
                                                                                      SHA-512:DF3CC2EDA4A88E2A96BAF2046474EAD9B38A8BF1E9EACAA6270B785A356490F369AC5765DF11D96631E47574074E12B7197211BA08E390CF628B637EC1707932
                                                                                      Malicious:false
                                                                                      Preview:network-status-version 3 microdesc.vote-status consensus.consensus-method 33.valid-after 2023-12-21 13:00:00.fresh-until 2023-12-21 14:00:00.valid-until 2023-12-21 16:00:00.voting-delay 300 300.client-versions 0.4.7.7,0.4.7.8,0.4.7.10,0.4.7.11,0.4.7.12,0.4.7.13,0.4.7.14,0.4.7.15,0.4.7.16,0.4.8.1-alpha,0.4.8.2-alpha,0.4.8.3-rc,0.4.8.4,0.4.8.5,0.4.8.6,0.4.8.7,0.4.8.8,0.4.8.9,0.4.8.10.server-versions 0.4.7.7,0.4.7.8,0.4.7.10,0.4.7.11,0.4.7.12,0.4.7.13,0.4.7.14,0.4.7.15,0.4.7.16,0.4.8.1-alpha,0.4.8.2-alpha,0.4.8.3-rc,0.4.8.4,0.4.8.5,0.4.8.6,0.4.8.7,0.4.8.8,0.4.8.9,0.4.8.10.known-flags Authority BadExit Exit Fast Guard HSDir MiddleOnly NoEdConsensus Running Stable StaleDesc Sybil V2Dir Valid.recommended-client-protocols Cons=2 Desc=2 DirCache=2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 Microdesc=2 Relay=2.recommended-relay-protocols Cons=2 Desc=2 DirCache=2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 LinkAuth=3 Microdesc=2 Relay=2.required-client-protocols Cons=2 Desc=2 Link=4 Microdesc=2 Relay=2.require
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:ASCII text, with very long lines (377), with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):5611
                                                                                      Entropy (8bit):5.2270685720723575
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:lALEa8vp2TgcXe7jrimrzq3fMUdd4HjuWMEynixCk8:cEZo4rxqvMYd4HjK9
                                                                                      MD5:FCC2F1178C3F8B017F66B9BC7FCF8E8F
                                                                                      SHA1:B53668EC1E3BA7E8589D6AFEA22A548F961DA55F
                                                                                      SHA-256:6304BD99C81EE468D71F88E0830EA700463C40F59C87AF41FE62F4354F8AAC56
                                                                                      SHA-512:E35D129B28A513FF53CF2883DA863400CFEF3B3228C499E4F475D9D4518A81446D684F6035BD44EED9BA7D5B03A2F52250686313829DF2C079E60919308F133B
                                                                                      Malicious:false
                                                                                      Preview:# Tor state file last generated on 2023-12-21 17:44:42 local time..# Other times below are in UTC..# You *do not* need to edit this file.....CircuitBuildTimeBin 825 1..CircuitBuildTimeBin 875 2..CircuitBuildTimeBin 925 2..CircuitBuildTimeBin 975 1..CircuitBuildTimeBin 1025 7..CircuitBuildTimeBin 1075 5..CircuitBuildTimeBin 1125 4..CircuitBuildTimeBin 1175 2..CircuitBuildTimeBin 1225 2..CircuitBuildTimeBin 1275 8..CircuitBuildTimeBin 1325 4..CircuitBuildTimeBin 1375 4..CircuitBuildTimeBin 1425 3..CircuitBuildTimeBin 1475 7..CircuitBuildTimeBin 1525 3..CircuitBuildTimeBin 1575 2..CircuitBuildTimeBin 1625 2..CircuitBuildTimeBin 1675 1..CircuitBuildTimeBin 1775 3..CircuitBuildTimeBin 1825 1..CircuitBuildTimeBin 1875 1..CircuitBuildTimeBin 1975 1..CircuitBuildTimeBin 2125 2..CircuitBuildTimeBin 2625 1..CircuitBuildTimeBin 3225 1..CircuitBuildTimeBin 15775 1..CircuitBuildTimeBin 16025 3..CircuitBuildTimeBin 16075 2..CircuitBuildTimeBin 16125 3..CircuitBuildTimeBin 16175 3..CircuitBuildTimeBi
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:ASCII text, with very long lines (1006)
                                                                                      Category:dropped
                                                                                      Size (bytes):2866955
                                                                                      Entropy (8bit):5.611525243321319
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:WyaXTZ4ocEo0u5q8yAfBZCMP1XNyaM0JzRhu5vcU3w5UKw2kkOOMo8Geu9kQWgZD:WPTuom15hfFXNyj0JqOl5LbOJSkQWgN
                                                                                      MD5:C69CD766EDF22E9397A95076EDBA4FE2
                                                                                      SHA1:4BE4797A60846E50DE33101ABF6EBE73C77508B7
                                                                                      SHA-256:6EF328292CAFCCD717BAC3F869B13BF327FF109AAD9344BEAD7BEC09BA8435C4
                                                                                      SHA-512:DF3CC2EDA4A88E2A96BAF2046474EAD9B38A8BF1E9EACAA6270B785A356490F369AC5765DF11D96631E47574074E12B7197211BA08E390CF628B637EC1707932
                                                                                      Malicious:false
                                                                                      Preview:network-status-version 3 microdesc.vote-status consensus.consensus-method 33.valid-after 2023-12-21 13:00:00.fresh-until 2023-12-21 14:00:00.valid-until 2023-12-21 16:00:00.voting-delay 300 300.client-versions 0.4.7.7,0.4.7.8,0.4.7.10,0.4.7.11,0.4.7.12,0.4.7.13,0.4.7.14,0.4.7.15,0.4.7.16,0.4.8.1-alpha,0.4.8.2-alpha,0.4.8.3-rc,0.4.8.4,0.4.8.5,0.4.8.6,0.4.8.7,0.4.8.8,0.4.8.9,0.4.8.10.server-versions 0.4.7.7,0.4.7.8,0.4.7.10,0.4.7.11,0.4.7.12,0.4.7.13,0.4.7.14,0.4.7.15,0.4.7.16,0.4.8.1-alpha,0.4.8.2-alpha,0.4.8.3-rc,0.4.8.4,0.4.8.5,0.4.8.6,0.4.8.7,0.4.8.8,0.4.8.9,0.4.8.10.known-flags Authority BadExit Exit Fast Guard HSDir MiddleOnly NoEdConsensus Running Stable StaleDesc Sybil V2Dir Valid.recommended-client-protocols Cons=2 Desc=2 DirCache=2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 Microdesc=2 Relay=2.recommended-relay-protocols Cons=2 Desc=2 DirCache=2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 LinkAuth=3 Microdesc=2 Relay=2.required-client-protocols Cons=2 Desc=2 Link=4 Microdesc=2 Relay=2.require
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:JSON data
                                                                                      Category:dropped
                                                                                      Size (bytes):1016
                                                                                      Entropy (8bit):5.238672058107617
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:YqHZ6T06Mhmp1m/ib0O0bihmeF1m/i6CUXyhmjX1m/ibxdB6hm9sH1m/iz0JahmU:YqHZ6T06Mce/ib0O0bicD/iDUXycjo/v
                                                                                      MD5:0CCB0B4AB6E8E3307FCC6A6CFA34AB9B
                                                                                      SHA1:522BA4650CA18795F9357495BB07D5E67AB183F3
                                                                                      SHA-256:FA88B5C21FF7E85D75DFB5DFC8598D09F03D0205D6C67FF1661BFB571D14181B
                                                                                      SHA-512:4256925C2CAE6F4E5F73128C213B86C29DF269142B6C56BCFF21A6D53AB8137A795F2C0F83C6554EBC1EB9B5E3B9AEC1B943FE2B714ECA78A809ECB9D88B699F
                                                                                      Malicious:false
                                                                                      Preview:{"RecentItems":[{"AppID":"Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge","PenUsageSec":15,"LastSwitchedLowPart":847405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.WindowsCommunicationsApps_8wekyb3d8bbwe!Microsoft.WindowsLive.Mail","PenUsageSec":15,"LastSwitchedLowPart":837405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.Office.OneNote_8wekyb3d8bbwe!microsoft.onenoteim","PenUsageSec":15,"LastSwitchedLowPart":827405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.Windows.Photos_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":817405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.MSPaint_8wekyb3d8bbwe!Microsoft.MSPaint","PenUsageSec":15,"LastSwitchedLowPart":807405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.WindowsMaps_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":797405920,"LastSwitchedHighPart":31061855,"PrePo
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):7413381
                                                                                      Entropy (8bit):7.999460551343611
                                                                                      Encrypted:true
                                                                                      SSDEEP:196608:nQB6egK058K67sY3/ayQFNOZhFhyfkv+/DF:JFFW3/a5FNEf45Z
                                                                                      MD5:A43D9BCAD3770524E73836B410837BFC
                                                                                      SHA1:BE62DE2EACE78083E4A0B23BABEE1E690FCBEA9B
                                                                                      SHA-256:DF09DC2C3DB64D488BCACB388EF80D5B3FD8AE720CF9E371D2F4BB4278BC2E92
                                                                                      SHA-512:1956F69A1596CA5D35D7BBA4F1E366141CF7F62094CFF63DB338F0A69DBAC44E3ECE23B797B1EC60379DAB919E99F0AA9B2275AB5D61D422569FBFE371DEEF2B
                                                                                      Malicious:false
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...`K.e.....................F......@.............@..........................@...................@..............................P........,..........................................................................................................CODE....d........................... ..`DATA....L...........................@...BSS.....L................................idata..P...........................@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....,.......,..................@..P.............@......................@..P........................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                      Category:dropped
                                                                                      Size (bytes):98304
                                                                                      Entropy (8bit):0.08235737944063153
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):32768
                                                                                      Entropy (8bit):0.017262956703125623
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                      MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                      SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                      SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                      SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                      Malicious:false
                                                                                      Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2326528
                                                                                      Entropy (8bit):7.9517423258122255
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:KJAvWkHDkNzuf+rckvtEY6RKCNViYl/efUhynGBKy5B:mAwhLre1RvNoleyGj
                                                                                      MD5:7141BD0372C9FBB80710A8EBB2687A5C
                                                                                      SHA1:AE00B8846506D72AB2CB57B1C59C33E55C3A5C18
                                                                                      SHA-256:C2B1F18F4C269E603F0A7595E1780B4F0A2631484A5C2C2CD9EB9FAACF39BC6D
                                                                                      SHA-512:327A0155134A5F8521C5499F43F7A436930B5F846207581716F9E9DAB4DB6931D6D44DC67401550DC8587F4CAFFE193F7BC62CAB6F18D3DC0FDCDBF6743CE1E5
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........nt.j...j...j...M.b.-...j...9......~...Ox..e.......T.............../......."...q...1....Q......k..Y...Richj...............PE..L...$.)G...........!.....0....,..F...........@................................#............@........................(........\........".......................#..o...@...............................................@..x............................text....).......0..................9..`.rdata.......@... ...@..............@..@.data.......`.......`..............@....code...:...........................@....rsrc........."......."................@.reloc..<.....#.......".............@..B....................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):32768
                                                                                      Entropy (8bit):0.017262956703125623
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                      MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                      SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                      SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                      SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                      Malicious:false
                                                                                      Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):4327808
                                                                                      Entropy (8bit):7.982622706203356
                                                                                      Encrypted:false
                                                                                      SSDEEP:98304:p8FlihkW1TH/E7QWzKKnUPa+/AZ0TzcGuTterOQ/CKJ8ySk0:elihkGiDpnUP93QGeVQ/Cn
                                                                                      MD5:76008C3F4A84021E02E9AEEC9FB1C9D8
                                                                                      SHA1:FE071F848A86914B39D094B3684A5C4AC95A9651
                                                                                      SHA-256:57FAA4A5A7D38230022594DEE9164DAC0ACBED13512414F05071C674C14A1826
                                                                                      SHA-512:B2323F38F5EF266B84B2409FB35EA33FCF3ABEC99F0C68B9509715DDB8340DEED7C8A4AB7DC6582C5BB7FD572580F080F057B932496531CD1C9E1F00FE6E94BA
                                                                                      Malicious:true
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................PE..L....t.c.................J@...D......<.......`@...@..................................jB.......................................@.P........g............A..............a@..............................~@.@............`@.|............................text....H@......J@................. ..`.rdata...3...`@..4...N@.............@..@.data...|.B...@.......@.............@....rsrc............h....@.............@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                      Category:dropped
                                                                                      Size (bytes):40960
                                                                                      Entropy (8bit):0.8553638852307782
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                      MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
                                                                                      Category:dropped
                                                                                      Size (bytes):20480
                                                                                      Entropy (8bit):0.848598812124929
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:TLVF1kwNbXYFpFNYcw+6UwcQVXH5fBODYfOg1ZAJFF0DiUhQ5de5SjhXE1:ThFawNLopFgU10XJBODqzqFF0DYde5P
                                                                                      MD5:9664DAA86F8917816B588C715D97BE07
                                                                                      SHA1:FAD9771763CD861ED8F3A57004C4B371422B7761
                                                                                      SHA-256:8FED359D88F0588829BA60D236269B2528742F7F66DF3ACF22B32B8F883FE785
                                                                                      SHA-512:E551D5CC3D5709EE00F85BB92A25DDC96112A4357DFEA3D859559D47DB30FEBD2FD36BDFA2BEC6DCA63D3E233996E9FCD2237F92CEE5B32BA8D7F2E1913B2DA9
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                      Category:dropped
                                                                                      Size (bytes):106496
                                                                                      Entropy (8bit):1.137181696973627
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cR/k4:MnlyfnGtxnfVuSVumEHRM4
                                                                                      MD5:2D903A087A0C793BDB82F6426B1E8EFB
                                                                                      SHA1:E7872CC094C598B104DA25AC6C8BEB82DAB3F08F
                                                                                      SHA-256:AD67ADF2D572EF49DC95FD1A879F3AD3E0F4103DD563E713C466A1F02D57ED9A
                                                                                      SHA-512:90080A361F04158C4E1CCBB3DE653FFF742C29A49523B6143B0047930FC34DC0F1D043D3C1B2B759933E1685A4CB382FD9E41B7ACDD362A2217C3810AEF95E65
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                      Category:dropped
                                                                                      Size (bytes):51200
                                                                                      Entropy (8bit):0.8746135976761988
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                                                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                                                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                                                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                                                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                                      Category:dropped
                                                                                      Size (bytes):20480
                                                                                      Entropy (8bit):0.6732424250451717
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                                      MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                                      SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                                      SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                                      SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\SysWOW64\explorer.exe
                                                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                                                      Category:modified
                                                                                      Size (bytes):196608
                                                                                      Entropy (8bit):1.1215420383712111
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                                                                                      MD5:9A809AD8B1FDDA60760BB6253358A1DB
                                                                                      SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                                                                                      SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                                                                                      SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                                                                                      Malicious:false
                                                                                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):20852
                                                                                      Entropy (8bit):6.05147791645295
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:cMY4QkV6icO1hMtqFU4WGYgVVdz31hiyd4AW9V9hC1hIhb50IU4mV91h5c2q48XE:6BkoicOaq6ddgV/T+yrqvUgb+3jnt8nE
                                                                                      MD5:8C124D1E48874E7D874E44FD7B676C52
                                                                                      SHA1:78908B001070D281168BA55A83C6F56193BAF94E
                                                                                      SHA-256:2F2168B2C707A21B00468DA70DE567D8F5A3974ADE5C382D5EE242D308BF7680
                                                                                      SHA-512:0F0B21B0FB595BC3690C60CBF252FB06DEC1CADD4FA775E7A9B8A837DAF028AAEFB20866AC2AB9F07C0DE093B0B273D2601D9448E82C75329BBA44F08EB8209A
                                                                                      Malicious:false
                                                                                      Preview:dir-key-certificate-version 3..fingerprint 0232AF901C31A04EE9848595AF9BB7620D4C5B2E..dir-key-published 2023-05-17 14:30:40..dir-key-expires 2024-05-17 14:30:40..dir-identity-key..-----BEGIN RSA PUBLIC KEY-----..MIIBigKCAYEAu9O0Pueesn0+29BlxZs60mBqehjdQtgSnKOm9QZxbQ0xrMQgbFnR..hWbKD8erenyeFk2SF6AJkbyzgYC89hyPW+8GBDmg5bE8fRKjgV/nI3tY2m4rkY3u..zSmYIdwqHUUc98Xzt9PaQ8IJAlDBY4XLKrWmJMxSyhBlVEept7+9Tj23qowW44Mz..xPJZ1aFkB1FpkD6qmoCzVZbhXy3cGt1nDwdJK7KqlaXziz9pFiw8PzTVU2xFgJNy..+nEcT72DBtk3G5K2Riu/aXY/D541Cioj9KMV4Nv4g8aBKx58Xq2tq1pFkc1Bqj1y..2MomVR3iskFzlqC8yKWGVe4OP2IaOhtcQJYp5GR9q+dWnr53WWNVxNu3sA9iMal3..PJUk5pIYrsmArGew5gmlCe+Al46nPINxc7ouztmStAV+2F6SpZlKOcstnT+KJ52O..1xnOSaj/WnzG2o4KZ9UrFQoUNOLQJcelPcC+vrinMk9BQPcB072l9NjpUBC9brsW..qTCMStn1jfDDAgMBAAE=..-----END RSA PUBLIC KEY-----..dir-signing-key..-----BEGIN RSA PUBLIC KEY-----..MIIBCgKCAQEAvIW/KEA4eoi2rkD6vDKcLu2+2DY5K3pd9P5edSvQ8mBY21CeUfhY..WI+XWr1K9U5/yNsJS8YCvGEtvNK+yEnHkBKLItvi6ibv6W8nP5l4sLhooJBaPm7v..FDhtbnp6HTMbSnBXTxT2gaSPJ+p9
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:ASCII text, with very long lines (1006)
                                                                                      Category:dropped
                                                                                      Size (bytes):2866955
                                                                                      Entropy (8bit):5.611525243321319
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:WyaXTZ4ocEo0u5q8yAfBZCMP1XNyaM0JzRhu5vcU3w5UKw2kkOOMo8Geu9kQWgZD:WPTuom15hfFXNyj0JqOl5LbOJSkQWgN
                                                                                      MD5:C69CD766EDF22E9397A95076EDBA4FE2
                                                                                      SHA1:4BE4797A60846E50DE33101ABF6EBE73C77508B7
                                                                                      SHA-256:6EF328292CAFCCD717BAC3F869B13BF327FF109AAD9344BEAD7BEC09BA8435C4
                                                                                      SHA-512:DF3CC2EDA4A88E2A96BAF2046474EAD9B38A8BF1E9EACAA6270B785A356490F369AC5765DF11D96631E47574074E12B7197211BA08E390CF628B637EC1707932
                                                                                      Malicious:false
                                                                                      Preview:network-status-version 3 microdesc.vote-status consensus.consensus-method 33.valid-after 2023-12-21 13:00:00.fresh-until 2023-12-21 14:00:00.valid-until 2023-12-21 16:00:00.voting-delay 300 300.client-versions 0.4.7.7,0.4.7.8,0.4.7.10,0.4.7.11,0.4.7.12,0.4.7.13,0.4.7.14,0.4.7.15,0.4.7.16,0.4.8.1-alpha,0.4.8.2-alpha,0.4.8.3-rc,0.4.8.4,0.4.8.5,0.4.8.6,0.4.8.7,0.4.8.8,0.4.8.9,0.4.8.10.server-versions 0.4.7.7,0.4.7.8,0.4.7.10,0.4.7.11,0.4.7.12,0.4.7.13,0.4.7.14,0.4.7.15,0.4.7.16,0.4.8.1-alpha,0.4.8.2-alpha,0.4.8.3-rc,0.4.8.4,0.4.8.5,0.4.8.6,0.4.8.7,0.4.8.8,0.4.8.9,0.4.8.10.known-flags Authority BadExit Exit Fast Guard HSDir MiddleOnly NoEdConsensus Running Stable StaleDesc Sybil V2Dir Valid.recommended-client-protocols Cons=2 Desc=2 DirCache=2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 Microdesc=2 Relay=2.recommended-relay-protocols Cons=2 Desc=2 DirCache=2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 LinkAuth=3 Microdesc=2 Relay=2.required-client-protocols Cons=2 Desc=2 Link=4 Microdesc=2 Relay=2.require
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:ASCII text, with very long lines (12354)
                                                                                      Category:modified
                                                                                      Size (bytes):22199279
                                                                                      Entropy (8bit):4.815172463916634
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:A4vKxFMCcK2O4caNRu9eteYaMoi4yIdS7KSTSVQ0+hGcja7BxCOW0Swi/DhofWol:EclnK9iO2jwcKLwgIHTduKC
                                                                                      MD5:42A7B3BD311A0080DCC89A8DBE6A31DA
                                                                                      SHA1:38BD6B9178FA23B35AB5E8A122368AE144C32C7B
                                                                                      SHA-256:894387D023DD7EA287D8D159DF43575DB74D39EB5ADBFFA7BAC35FDFB21F4442
                                                                                      SHA-512:38DCE65FE546DBF32858F2956EF204E1122D18CD6C2742D0E6AEF78F12B175B4039A1C992FE23F12EE209A702277B3A5503D68E85D435DF2B3BD43ECCD20DB8F
                                                                                      Malicious:false
                                                                                      Preview:@last-listed 2023-12-21 16:25:03.onion-key.-----BEGIN RSA PUBLIC KEY-----.MIGJAoGBALViJIiI6ndKfaRNwe9iBScAYloulpdZEG04jbmmyCCUtmyf/K7iaA80.dCoNgkzOpdH62c6rYoz+AjlCEwO/DHN1fC6Xv2BVYUZInHEi2XcrLV2b4XzRYvxn.yQ6q9xn8AQV01M1qSK1hp8sYCIQLk59sMGcgtlx2g88YOoxnL123AgMBAAE=.-----END RSA PUBLIC KEY-----.ntor-onion-key cZ1W8fhoTuNcOUXboyd/Xu/6jY4lC+kU7Gbj1eiRpn4.id ed25519 TDTzAZTXIcV+uEl7P6gEgmu1RvUSYzuMxwxV+eWyFno.@last-listed 2023-12-21 16:25:03.onion-key.-----BEGIN RSA PUBLIC KEY-----.MIGJAoGBAMxwMayyAhl/1mYZ2bS4uY2t9Zqk30+0drLU9BT+c3NlyhfBG1cH7ger.z4/HREWtdVl2xAiwj64Zg/LF3Tqky/BpkWh3Sx93FKJppUSmB790922Qf/sCc+lY.ppnBDZ5QFeq3nypYqEesrq8HWnwFCgOaZY32zFLK8m9xFIemnn8XAgMBAAE=.-----END RSA PUBLIC KEY-----.ntor-onion-key 01SIuITQ717lvnJTJJoRESLXzYaq7sQKacVT9m//IgI.family $004F9A0513C84E72054CEB555DB51EEEF319546D $0055DB090820D7C08999EC1598FD6EA6365861AD $008F10F88397C11C062217EAC35D782F03BDF4C7 $009EF5F8572D671AFCBBAD65998BA35B50EE04BC $00BD33C25A006BA95103D3E8043FA7EF1E2BCA6C $00FB85B65AC2F460CD46A
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:ASCII text, with very long lines (377), with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):5611
                                                                                      Entropy (8bit):5.2270685720723575
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:lALEa8vp2TgcXe7jrimrzq3fMUdd4HjuWMEynixCk8:cEZo4rxqvMYd4HjK9
                                                                                      MD5:FCC2F1178C3F8B017F66B9BC7FCF8E8F
                                                                                      SHA1:B53668EC1E3BA7E8589D6AFEA22A548F961DA55F
                                                                                      SHA-256:6304BD99C81EE468D71F88E0830EA700463C40F59C87AF41FE62F4354F8AAC56
                                                                                      SHA-512:E35D129B28A513FF53CF2883DA863400CFEF3B3228C499E4F475D9D4518A81446D684F6035BD44EED9BA7D5B03A2F52250686313829DF2C079E60919308F133B
                                                                                      Malicious:false
                                                                                      Preview:# Tor state file last generated on 2023-12-21 17:44:42 local time..# Other times below are in UTC..# You *do not* need to edit this file.....CircuitBuildTimeBin 825 1..CircuitBuildTimeBin 875 2..CircuitBuildTimeBin 925 2..CircuitBuildTimeBin 975 1..CircuitBuildTimeBin 1025 7..CircuitBuildTimeBin 1075 5..CircuitBuildTimeBin 1125 4..CircuitBuildTimeBin 1175 2..CircuitBuildTimeBin 1225 2..CircuitBuildTimeBin 1275 8..CircuitBuildTimeBin 1325 4..CircuitBuildTimeBin 1375 4..CircuitBuildTimeBin 1425 3..CircuitBuildTimeBin 1475 7..CircuitBuildTimeBin 1525 3..CircuitBuildTimeBin 1575 2..CircuitBuildTimeBin 1625 2..CircuitBuildTimeBin 1675 1..CircuitBuildTimeBin 1775 3..CircuitBuildTimeBin 1825 1..CircuitBuildTimeBin 1875 1..CircuitBuildTimeBin 1975 1..CircuitBuildTimeBin 2125 2..CircuitBuildTimeBin 2625 1..CircuitBuildTimeBin 3225 1..CircuitBuildTimeBin 15775 1..CircuitBuildTimeBin 16025 3..CircuitBuildTimeBin 16075 2..CircuitBuildTimeBin 16125 3..CircuitBuildTimeBin 16175 3..CircuitBuildTimeBi
                                                                                      Process:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      File Type:ASCII text, with very long lines (1006)
                                                                                      Category:dropped
                                                                                      Size (bytes):2866955
                                                                                      Entropy (8bit):5.611525243321319
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:WyaXTZ4ocEo0u5q8yAfBZCMP1XNyaM0JzRhu5vcU3w5UKw2kkOOMo8Geu9kQWgZD:WPTuom15hfFXNyj0JqOl5LbOJSkQWgN
                                                                                      MD5:C69CD766EDF22E9397A95076EDBA4FE2
                                                                                      SHA1:4BE4797A60846E50DE33101ABF6EBE73C77508B7
                                                                                      SHA-256:6EF328292CAFCCD717BAC3F869B13BF327FF109AAD9344BEAD7BEC09BA8435C4
                                                                                      SHA-512:DF3CC2EDA4A88E2A96BAF2046474EAD9B38A8BF1E9EACAA6270B785A356490F369AC5765DF11D96631E47574074E12B7197211BA08E390CF628B637EC1707932
                                                                                      Malicious:false
                                                                                      Preview:network-status-version 3 microdesc.vote-status consensus.consensus-method 33.valid-after 2023-12-21 13:00:00.fresh-until 2023-12-21 14:00:00.valid-until 2023-12-21 16:00:00.voting-delay 300 300.client-versions 0.4.7.7,0.4.7.8,0.4.7.10,0.4.7.11,0.4.7.12,0.4.7.13,0.4.7.14,0.4.7.15,0.4.7.16,0.4.8.1-alpha,0.4.8.2-alpha,0.4.8.3-rc,0.4.8.4,0.4.8.5,0.4.8.6,0.4.8.7,0.4.8.8,0.4.8.9,0.4.8.10.server-versions 0.4.7.7,0.4.7.8,0.4.7.10,0.4.7.11,0.4.7.12,0.4.7.13,0.4.7.14,0.4.7.15,0.4.7.16,0.4.8.1-alpha,0.4.8.2-alpha,0.4.8.3-rc,0.4.8.4,0.4.8.5,0.4.8.6,0.4.8.7,0.4.8.8,0.4.8.9,0.4.8.10.known-flags Authority BadExit Exit Fast Guard HSDir MiddleOnly NoEdConsensus Running Stable StaleDesc Sybil V2Dir Valid.recommended-client-protocols Cons=2 Desc=2 DirCache=2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 Microdesc=2 Relay=2.recommended-relay-protocols Cons=2 Desc=2 DirCache=2 HSDir=2 HSIntro=4 HSRend=2 Link=4-5 LinkAuth=3 Microdesc=2 Relay=2.required-client-protocols Cons=2 Desc=2 Link=4 Microdesc=2 Relay=2.require
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2017792
                                                                                      Entropy (8bit):7.882413889771764
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:itCW0MSJfxkfBNec7L3jdHWNefneKAIBvxlRF1E:itz0MiOfbD79HWNeeKDtn1
                                                                                      MD5:EE1049D8F8248D11080582FE27F96843
                                                                                      SHA1:6701BA82ECE6878C61FCE5204DEF8EFDC28822AB
                                                                                      SHA-256:F3C70EC32049139737226C85A87D453AC98C6A0FFC7747BA4F65118A1B8EF670
                                                                                      SHA-512:F8DB9E2E7E0DEC1F95B83E52F67B15C0E93FCBA0801D220DB43C23D732A2BB298E986FD65493019F3FED9BBC840032FF5F5C9AE3DF6A025C596622B34757DEA6
                                                                                      Malicious:true
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................................PE..L......c.............................Y....... ....@..........................@.......u..........................................<....@...............................................................4..@............................................text............................... ..`.data........ ......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):8885269
                                                                                      Entropy (8bit):7.914736904189853
                                                                                      Encrypted:false
                                                                                      SSDEEP:196608:EgJCU/9onJ5hrZEce9tGPqKM48RmU/3ZlsPv4TbOTvN8CsnHC:VJj9c5hlEiPNMtN3ZW43OTqi
                                                                                      MD5:033576B4B54E5CB69EC8491FF6624C9F
                                                                                      SHA1:CEA7579E77BD6814976D39A4A8B3765ACA8A36E6
                                                                                      SHA-256:F3451E6CC0C2C03F52BF1DD6CFBED33A43188D08B7410B189E986A91F75D6F7E
                                                                                      SHA-512:3ACCECD939419E88CB7267D9563A80679B07804DFC71924F8523D28A098515E105E48B9D315504CD85BDA993FD5BA62BE2F1851037057E36B531EA56C07BDA9B
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........r...r...r...q...r...w.'.r...v...r.<.....r.<.w...r.<.v...r.<.q...r...s...r...s...r...v...r...p...r.Rich..r.........................PE..d......e.........."....$............@..........@.....................................9....`....................................................x.... .......... ..............X...................................@...@............................................text...0........................... ..`.rdata...*.......,..................@..@.data...............................@....pdata... ......."..................@..@_RDATA..\...........................@..@.rsrc....... ......................@..@.reloc..X...........................@..B................................................................................................................................................................................................
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):4765600
                                                                                      Entropy (8bit):6.944483011133724
                                                                                      Encrypted:false
                                                                                      SSDEEP:98304:IfCOrHQms2QJmu6eonAh3EX5hKMrBA7dLV:8C0H82Q03n+3EX5ltWdp
                                                                                      MD5:62C9E15DD99C7D3B7367DCF220579C54
                                                                                      SHA1:A735B0E57F0F013592A55675220E5F4D7C093F78
                                                                                      SHA-256:F0031FCA754E1E01DB4BA9D8DF732CABFD34117B136F8E44D5869D6F727C3930
                                                                                      SHA-512:B6384B4A6B3C6CB757E89110D7B3A23F8D8E056A12E515E3C156DB5B97E09C0E53831E3BDC0BAD121D8C661E8E26A6992710F23EC6FFA5464516366081095E09
                                                                                      Malicious:true
                                                                                      Yara Hits:
                                                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\E212.exe, Author: Joe Security
                                                                                      • Rule: INDICATOR_EXE_Packed_DotNetReactor, Description: Detects executables packed with unregistered version of .NET Reactor, Source: C:\Users\user\AppData\Local\Temp\E212.exe, Author: ditekSHen
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..z+..6......@.i.. ....+...@.. .......................`x.....s.I...@.................................:.;.P.... ;..x............H..............................................................................................text.....+.. ...z+................. ..` 2....+......~+.............@..@.reloc........:......(7.............@..B.idata... ....;......*7.............@....rsrc....z... ;..z...,7.............@..@.themida..+...=.......9.............`....boot........`i.......9.............`..`........................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):600849
                                                                                      Entropy (8bit):6.937470308250879
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:7DDcoSaYu6NCMDJCxEwJCxEKJCxElHvQmMYxf5EqEeSMk5A3ZqpVaM2DKBF4dBgc:XzKu6NCM1k+pPQmtkqEeSMk5e4t224dV
                                                                                      MD5:08DEB048589E4E6D6F16AB66BD1020F8
                                                                                      SHA1:F8C229E1EC9D91FD7CDCCACFE6BC6B8A24F5C703
                                                                                      SHA-256:373C9D5774B17374C04EAAE846091B37D00CCD6052D8A877F0A3595D8EC28251
                                                                                      SHA-512:FBC921B7947F22496D75ED642DB82070D1BEF81C3B5C5960FFB308663EC6E311064F4252429F1F89E3C68D607E0331230E6C181454E71FB941521B4CDD88B053
                                                                                      Malicious:true
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~.BJ:.,.:.,.:.,.$.. .,.$..*.,.$..}.,...q.9.,.:.-.u.,.3..;.,.3..;.,.Rich:.,.........................PE..L...o*.e............................{A............@..........................p.......................................@..D...<...(....................................................................................................................bss....:%.......&.................. ..`.text....a...@...b...*.............. ..`.rdata..............................@..@.data....e.......\..................@....frAQB...0...@...'.....................@................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):247808
                                                                                      Entropy (8bit):6.569379368574319
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:u9oz5L1fzdy7aCtjUGjZNaz9MNoisgcc25DAgweORrR1/XhdNYVDBk:nz5LN21tjjjZNAMN9sgBg3TO9/nNs
                                                                                      MD5:727A16734E04C21EE28B8981510BF802
                                                                                      SHA1:B13A3F83CDB7719A41C0ACC642893E024CFC4CEF
                                                                                      SHA-256:738AA03458DF3924541D13BF664F1863573963E17FC65CAF37671556069CC5C2
                                                                                      SHA-512:51430D1B0F5A61BE307771A5372B47624B9F9D3FBADED80FC1E017E4668C0F31E2D862B02DC08268634FE0464583C4BC189985BCDC9933B1FB5B2A550F255D70
                                                                                      Malicious:true
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................PE..L....Nod......................C......<.......0....@...........................E.....?l.......................................[..P.....D..g...........................1...............................N..@............0..|............................text...b........................... ..`.rdata...3...0...4..................@..@.data...|.B..p.......L..............@....rsrc....g....D..h...`..............@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):87864
                                                                                      Entropy (8bit):6.50974924823557
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:JiOTTyNdd/mqN5fomseOpLJ5UP4nVnWecbtGgcNZVKL:JD4Vzgh5UXecbt2ju
                                                                                      MD5:89A24C66E7A522F1E0016B1D0B4316DC
                                                                                      SHA1:5340DD64CFE26E3D5F68F7ED344C4FD96FBD0D42
                                                                                      SHA-256:3096CAFB6A21B6D28CF4FE2DD85814F599412C0FE1EF090DD08D1C03AFFE9AB6
                                                                                      SHA-512:E88E0459744A950829CD508A93E2EF0061293AB32FACD9D8951686CBE271B34460EFD159FD8EC4AA96FF8A629741006458B166E5CFF21F35D049AD059BC56A1A
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).uym~.*m~.*m~.*...*o~.*d..*f~.*m~.*F~.*V .+n~.*V .+g~.*V .+f~.*V .+s~.*V .+l~.*V .*l~.*V .+l~.*Richm~.*........PE..d....Z.........." .........T......@........................................p......m.....`A........................................0...4...d........P.......0..........8?...`..p...p...8............................................................................text...'........................... ..`.rdata..f5.......6..................@..@.data........ ......................@....pdata.......0......................@..@_RDATA.......@......................@..@.rsrc........P......................@..@.reloc..p....`......................@..B........................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):94736
                                                                                      Entropy (8bit):6.337586298062742
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:DGb6DBCvurMRnQhVx8/Nlv+SSm9YmFN87Xgq4ToV+dypRI84VAyE:abfXyg7pp9TC7Xgq4ToV+kRI84VY
                                                                                      MD5:CF77513525FC652BAD6C7F85E192E94B
                                                                                      SHA1:23EC3BB9CDC356500EC192CAC16906864D5E9A81
                                                                                      SHA-256:8BCE02E8D44003C5301608B1722F7E26AADA2A03D731FA92A48C124DB40E2E41
                                                                                      SHA-512:DBC1BA8794CE2D027145C78B7E1FC842FFBABB090ABF9C29044657BDECD44396014B4F7C2B896DE18AAD6CFA113A4841A9CA567E501A6247832B205FE39584A9
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e.l..k?..k?..k?.|.?..k?.Zj>..k?B..?..k?.Zh>..k?.Zn>..k?.Zo>..k?vZj>..k?.lj>..k?..j?..k?vZc>..k?vZk>..k?vZ.?..k?vZi>..k?Rich..k?........PE..d...z.:_.........." .........j......$...............................................<6....`........................................../..H...80...............`.......X..................T............................................................................text............................... ..`.rdata...;.......<..................@..@.data........@.......0..............@....pdata.......`.......>..............@..@.gfids.......p.......H..............@..@.rsrc................J..............@..@.reloc...............V..............@..B................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):132624
                                                                                      Entropy (8bit):5.962671714439977
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:bRyGuR/8oD9tR2yHBIjxBaVGTODsAR04D0RfUGpd0/b8aMgiadI8VPEye:bcDd8oM+kBVQ/8f5pdObL7dI8VPG
                                                                                      MD5:5E869EEBB6169CE66225EB6725D5BE4A
                                                                                      SHA1:747887DA0D7AB152E1D54608C430E78192D5A788
                                                                                      SHA-256:430F1886CAF059F05CDE6EB2E8D96FEB25982749A151231E471E4B8D7F54F173
                                                                                      SHA-512:FEB6888BB61E271B1670317435EE8653DEDD559263788FBF9A7766BC952DEFD7A43E7C3D9F539673C262ABEDD97B0C4DD707F0F5339B1C1570DB4E25DA804A16
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........$\.kw\.kw\.kwU..wZ.kwg.jv^.kwg.hv_.kwg.nvV.kwg.ovV.kw..jv^.kw..ov].kw..jv[.kw\.jw..kw..hv].kw..cvT.kw..kv].kw..w].kw..iv].kwRich\.kw........................PE..d...r.:_.........." .........................................................@....../G....`.......................................................... .......................0.......e..T............................f...............0...............................text............................... ..`.rdata..pq...0...r..................@..@.data....9.......4..................@....pdata..............................@..@.gfids..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):38928
                                                                                      Entropy (8bit):5.959951673192366
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:AyvaHXGH0o9MBl7nqHQ03dpI8sIZhWDG4yfkO:UKnyBlmHQadpI8sIZcyMO
                                                                                      MD5:B32CB9615A9BADA55E8F20DCEA2FBF48
                                                                                      SHA1:A9C6E2D44B07B31C898A6D83B7093BF90915062D
                                                                                      SHA-256:CA4F433A68C3921526F31F46D8A45709B946BBD40F04A4CFC6C245CB9EE0EAB5
                                                                                      SHA-512:5C583292DE2BA33A3FC1129DFB4E2429FF2A30EEAF9C0BCFF6CCA487921F0CA02C3002B24353832504C3EEC96A7B2C507F455B18717BCD11B239BBBBD79FADBE
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%_..a>..a>..a>..hF^.c>..Z`..c>..Z`..c>..Z`..k>..Z`..k>...`..c>..:V..c>...W..b>..a>..8>...`..`>...`..`>...`2.`>...`..`>..Richa>..................PE..d...y.:_.........." .....6...J.......4....................................................`..........................................e..P...`e..x....................~..............0[..T............................[...............P...............................text....5.......6.................. ..`.rdata..p ...P..."...:..............@..@.data...0............\..............@....pdata...............h..............@..@.gfids...............n..............@..@.rsrc................p..............@..@.reloc...............|..............@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):176144
                                                                                      Entropy (8bit):6.6945247495968045
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:KCvUDHEIzx6yBexOV3fNDjGTtDlQxueKd03DV8tv9XIGIPExZJV9mNoA2v1kqnfE:tvUtdBexOlNDk+xTKg8tlJKyXYOAC1Lc
                                                                                      MD5:5FBB728A3B3ABBDD830033586183A206
                                                                                      SHA1:066FDE2FA80485C4F22E0552A4D433584D672A54
                                                                                      SHA-256:F9BC6036D9E4D57D08848418367743FB608434C04434AB07DA9DABE4725F9A9B
                                                                                      SHA-512:31E7C9FE9D8680378F8E3EA4473461BA830DF2D80A3E24E5D02A106128D048430E5D5558C0B99EC51C3D1892C76E4BAA14D63D1EC1FC6B1728858AA2A255B2FB
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........).o.z.o.z.o.z..7z.o.z.1.{.o.z.1.{.o.z.1.{.o.z.1.{.o.zi1.{.o.z...{.o.z.o.z.o.zi1.{.o.zi1.{.o.zi1[z.o.zi1.{.o.zRich.o.z........................PE..d.....:_.........." ................H.....................................................`.........................................PW..L....W..x...............t...............@....3..T............................4...............................................text...#........................... ..`.rdata..............................@..@.data........p.......T..............@....pdata..t............n..............@..@.gfids..............................@..@.rsrc...............................@..@.reloc..@...........................@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):76816
                                                                                      Entropy (8bit):6.0942584309558985
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:vG/A9Fu5OEPenRXk5d2jw/hEdFcvY+RgOmkcH7dI8VwYyo:e/Anu5OEPenRXRjw/h0FcvYcgOmkcbdV
                                                                                      MD5:8EA18D0EEAE9044C278D2EA7A1DBAE36
                                                                                      SHA1:DE210842DA8CB1CB14318789575D65117D14E728
                                                                                      SHA-256:9822C258A9D25062E51EAFC45D62ED19722E0450A212668F6737EB3BFE3A41C2
                                                                                      SHA-512:D275CE71D422CFAACEF1220DC1F35AFBA14B38A205623E3652766DB11621B2A1D80C5D0FB0A7DF19402EBE48603E76B8F8852F6CBFF95A181D33E797476029F0
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........%A..K...K...K......K..J...K..H...K..N...K..O...K.G.J...K...J...K...J.A.K.G.C...K.G.K...K.G.....K.G.I...K.Rich..K.........PE..d...~.:_.........." .....x...........v.......................................`....... ....`.........................................0...P............@....... ...............P.........T...........................@................................................text...cw.......x.................. ..`.rdata..bA.......B...|..............@..@.data....=.......8..................@....pdata....... ......................@..@.gfids.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):120848
                                                                                      Entropy (8bit):6.015568704435241
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:B9+/8UxGzqHYjeS0Woia4TMpi6EPQNvURI847uHV:b+UUxGiY8Wo1UVV
                                                                                      MD5:5A393BB4F3AE499541356E57A766EB6A
                                                                                      SHA1:908F68F4EA1A754FD31EDB662332CF0DF238CF9A
                                                                                      SHA-256:B6593B3AF0E993FD5043A7EAB327409F4BF8CDCD8336ACA97DBE6325AEFDB047
                                                                                      SHA-512:958584FD4EFAA5DD301CBCECBFC8927F9D2CAEC9E2826B2AF9257C5EEFB4B0B81DBBADBD3C1D867F56705C854284666F98D428DC2377CCC49F8E1F9BBBED158F
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........a...............x2......^.......^.......^.......^......k^......Zi.......h..............k^......k^......k^^.....k^......Rich....................PE..d.....:_.........." .....................................................................`..........................................;..d...T<..................................h....%..T............................&..................8............................text...s........................... ..`.rdata..r...........................@..@.data....N...p...J...P..............@....pdata..............................@..@.gfids..............................@..@.rsrc...............................@..@.reloc..h...........................@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):69648
                                                                                      Entropy (8bit):6.022045168499411
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:wZSaB9UmU+YBYGnmmwe06hcvfyRiDpI8sS1yh:wZSDoe0FvfyRiDpI8sSo
                                                                                      MD5:09F66528018FFEF916899845D6632307
                                                                                      SHA1:CF9DDAD46180EF05A306DCB05FDB6F24912A69CE
                                                                                      SHA-256:34D89FE378FC10351D127FB85427449F31595ECCF9F5D17760B36709DD1449B9
                                                                                      SHA-512:ED406792D8A533DB71BD71859EDBB2C69A828937757AFEC1A83FD1EACB1E5E6EC9AFE3AA5E796FA1F518578F6D64FF19D64F64C9601760B7600A383EFE82B3DE
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9.r{}..(}..(}..(t..({..(F..)...(F..)...(F..)v..(F..)w..(..)...(&..)...(...)x..(}..(...(..)...(..)|..(..(|..(..)|..(Rich}..(........................PE..d.....:_.........." .....~...|......HP.......................................P.......P....`.........................................P...P............0..........,............@......P...T............................................................................text...S}.......~.................. ..`.rdata...C.......D..................@..@.data...h...........................@....pdata..,...........................@..@.gfids....... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                      Category:dropped
                                                                                      Size (bytes):1024268
                                                                                      Entropy (8bit):5.540443460646943
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:PGHcjTosQNRs54PK4IOGpiD8pVi+ZEf6EfmLSKvFVLJ:PGHcjTosQNRs54PK4IPZ7LvZ
                                                                                      MD5:8386CF8ADD72BAB03573064B6E1D89D2
                                                                                      SHA1:C451D2F3EED6B944543F19C5BD15AE7E8832BBD4
                                                                                      SHA-256:2EEA4B6202A6A6F61CB4D75C78BE5EC2E1052897F54973797885F2C3B24D202C
                                                                                      SHA-512:2BB61F7FAC7ECC7D5654756AE8286D5FD9E2730E6AC42F3E7516F598E00FD8B9B6D3E77373994BB31D89831278E6833D379F306D52033FA5C48A786AC67DA2B2
                                                                                      Malicious:false
                                                                                      Preview:PK..........!..1Y............_bootlocale.pycB................................@....z...d.Z.d.d.l.Z.d.d.l.Z.e.j...d...r,d.d.d...Z.nJy.e.j...W.n4..e.k.rj......e.e.d...r\d.d.d...Z.n.d.d.d...Z.Y.n.X.d.d.d...Z.d.S.)...A minimal subset of the locale module used at interpreter startup.(imported by the _io module), in order to reduce startup time...Don't import directly from third-party code; use the `locale` module instead!......N..winTc................C........t.j.j.r.d.S.t.....d...S.).N..UTF-8.....)...sys..flags..utf8_mode.._locale.._getdefaultlocale)...do_setlocale..r......_bootlocale.py..getpreferredencoding...............r......getandroidapilevelc................C........d.S.).N..UTF-8r....).r....r....r....r....r...............c................C........t.j.j.r.d.S.d.d.l.}.|...|...S.).N..UTF-8r....).r....r....r......localer....).r....r....r....r....r....r.....................c................C....6...|.r.t...t.j.j.r.d.S.t...t.j...}.|.s2t.j.d.k.r2d.}.|.S.).N..UTF-8..darwin)...AssertionErro
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):3399200
                                                                                      Entropy (8bit):6.094152840203032
                                                                                      Encrypted:false
                                                                                      SSDEEP:98304:R3+YyRoAK2rXHsoz5O8M1CPwDv3uFh+r:t9yWAK2zsozZM1CPwDv3uFh+r
                                                                                      MD5:CC4CBF715966CDCAD95A1E6C95592B3D
                                                                                      SHA1:D5873FEA9C084BCC753D1C93B2D0716257BEA7C3
                                                                                      SHA-256:594303E2CE6A4A02439054C84592791BF4AB0B7C12E9BBDB4B040E27251521F1
                                                                                      SHA-512:3B5AF9FBBC915D172648C2B0B513B5D2151F940CCF54C23148CD303E6660395F180981B148202BEF76F5209ACC53B8953B1CB067546F90389A6AA300C1FBE477
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............K..K..K..;K..K...J..K...J..K...J..K...J..K...J..K..Kb.Kd..J..Kd..J..Kd..J..Kd.WK..Kd..J..KRich..K........................PE..d......^.........." .....R$..........r.......................................`4......~4...`.........................................`...hg...3.@.....3.|.....1.......3. .....3..O...m,.8............................m,...............3..............................text...GQ$......R$................. ..`.rdata.......p$......V$.............@..@.data....z...P1..,...41.............@....pdata..P.....1......`1.............@..@.idata...#....3..$....3.............@..@.00cfg........3......@3.............@..@.rsrc...|.....3......B3.............@..@.reloc..fx....3..z...J3.............@..B................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):689184
                                                                                      Entropy (8bit):5.526574117413294
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:1SurcFFRd4l6NCNH98PikxqceDotbA/nJspatQM5eJpAJfeMw4o8s6U2lvz:1KWZH98PiRLsAtf8AmMHogU2lvz
                                                                                      MD5:BC778F33480148EFA5D62B2EC85AAA7D
                                                                                      SHA1:B1EC87CBD8BC4398C6EBB26549961C8AAB53D855
                                                                                      SHA-256:9D4CF1C03629F92662FC8D7E3F1094A7FC93CB41634994464B853DF8036AF843
                                                                                      SHA-512:80C1DD9D0179E6CC5F33EB62D05576A350AF78B5170BFDF2ECDA16F1D8C3C2D0E991A5534A113361AE62079FB165FFF2344EFD1B43031F1A7BFDA696552EE173
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E......T...T...T...T...TS.U...TZ.U...TS.U...TS.U...TS.U...T..U...T...T.T..U-..T..U...T..uT...T..U...TRich...T........PE..d......^.........." .....(...H.......%..............................................H.....`..............................................N..85..........s........K...j.. .......L.......8............................................ ..8............................text....&.......(.................. ..`.rdata...%...@...&...,..............@..@.data...!M...p...D...R..............@....pdata..TT.......V..................@..@.idata...V... ...X..................@..@.00cfg...............D..............@..@.rsrc...s............F..............@..@.reloc..5............N..............@..B................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):3750416
                                                                                      Entropy (8bit):6.384383088490926
                                                                                      Encrypted:false
                                                                                      SSDEEP:49152:KjVpkcACTIK0IKhyn9iafAdH1ZRHLqUCbNSuvYVeP84mzIAA5H0LMznZPMXT7p31:3CTIdKI7UWu4cAgHCMzqNOyVB
                                                                                      MD5:C4709F84E6CF6E082B80C80B87ABE551
                                                                                      SHA1:C0C55B229722F7F2010D34E26857DF640182F796
                                                                                      SHA-256:CA8E39F2B1D277B0A24A43B5B8EADA5BAF2DE97488F7EF2484014DF6E270B3F3
                                                                                      SHA-512:E04A5832B9F2E1E53BA096E011367D46E6710389967FA7014A0E2D4A6CE6FC8D09D0CE20CEE7E7D67D5057D37854EDDAB48BEF7DF1767F2EC3A4AB91475B7CE4
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........k.y...y...y.......y...'...y......y...'...y...'...y...'...y.......y...y...x..,'..Fy..,'...y..,'...y..,'...y..Rich.y..........................PE..d...c.:_.........." .....8.... .....D.........................................<.......9...`.........................................p....... ?/.|.....;.......9..w... 9.......;..q......T........................... ................P..0............................text....7.......8.................. ..`.rdata.......P.......<..............@..@.data....z...p/......P/.............@....pdata...w....9..x...(7.............@..@.gfids.......p;.......8.............@..@.rsrc.........;.......8.............@..@.reloc...q....;..r....8.............@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):27152
                                                                                      Entropy (8bit):6.048170705523046
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:FekE2XR1G6sOhmQI2HTRcqJcE99qT3dI8qGvnYPLxDG4y8Z6K9:F9csXHN/d9qT3dI8qGvWDG4yM
                                                                                      MD5:FB4A0D7ABAEAA76676846AD0F08FEFA5
                                                                                      SHA1:755FD998215511506EDD2C5C52807B46CA9393B2
                                                                                      SHA-256:65A3C8806D456E9DF2211051ED808A087A96C94D38E23D43121AC120B4D36429
                                                                                      SHA-512:F5B3557F823EE4C662F2C9B7ECC5497934712E046AA8AE8E625F41756BEB5E524227355316F9145BFABB89B0F6F93A1F37FA94751A66C344C38CE449E879D35F
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i...`.e.k...R...k...R...j...R...c...R...c......k...2...l...i...R......h......h......h......h...Richi...........................PE..d...v.:_.........." .........4.......................................................C....`.........................................0:..L...|:..x............`.......P..........,....3..T...........................`3...............0...............................text............................... ..`.rdata.......0......."..............@..@.data........P.......6..............@....pdata.......`.......<..............@..@.gfids.......p.......@..............@..@.rsrc................B..............@..@.reloc..,............N..............@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):1705120
                                                                                      Entropy (8bit):6.496511987047776
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:umJTd0nVi/Md3bupZkKBhWPRIlq5YZ6a2CXH7oZgKGc+erWJUVWyubuapwQDlaTR:umJTd4iMwXH7oZgKb++BVL4B+GITgr0h
                                                                                      MD5:C0B23815701DBAE2A359CB8ADB9AE730
                                                                                      SHA1:5BE6736B645ED12E97B9462B77E5A43482673D90
                                                                                      SHA-256:F650D6BC321BCDA3FC3AC3DEC3AC4E473FB0B7B68B6C948581BCFC54653E6768
                                                                                      SHA-512:ED60384E95BE8EA5930994DB8527168F78573F8A277F8D21C089F0018CD3B9906DA764ED6FCC1BD4EFAD009557645E206FBB4E5BAEF9AB4B2E3C8BB5C3B5D725
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........k)...GD..GD..GD.bFE..GD9..D..GD.bDE..GD.bBE..GD.bCE..GD.r.D..GD.jAE..GD.jFE..GD..FD..GD.bOE..GD.bGE..GD.b.D..GD.bEE..GDRich..GD........PE..d......\.........." .....d..........0h.......................................@.......b....`..........................................p..._......T.......0.... ............... .......<...............................=...............................................text....b.......d.................. ..`.rdata...k.......l...h..............@..@.data...."..........................@....pdata....... ......................@..@.rsrc...0...........................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):10012
                                                                                      Entropy (8bit):4.988870027581882
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:oM9irmCuZgxr31nvnaLAlgspxUth+PNkuQmYz6mh8029d2rPYVzXWamv:oM9irmCuixrxvispxUth+IzX29grPKzu
                                                                                      MD5:AAD7CE4027C713577DF2BC8D35406C13
                                                                                      SHA1:931262903B347F18AC1BE338524DB851B7AAE5BB
                                                                                      SHA-256:D4B3D9601454EA4828DFF3BE426C33FB845D005E98D2CC139DBB0D69CAD3168B
                                                                                      SHA-512:F54362286A3BCC4A421AC1687C6C1986C6575CF7233207D905EBE9217323612663728B8300D5660FC1F5A297BE7D2BFA770F8743C8D115533C3EA8BA5004BC36
                                                                                      Malicious:false
                                                                                      Preview:# -*- tcl -*-.# ### ### ### ######### ######### #########.## Overview..# Heuristics to assemble a platform identifier from publicly available.# information. The identifier describes the platform of the currently.# running tcl shell. This is a mixture of the runtime environment and.# of build-time properties of the executable itself..#.# Examples:.# <1> A tcl shell executing on a x86_64 processor, but having a.# wordsize of 4 was compiled for the x86 environment, i.e. 32.# bit, and loaded packages have to match that, and not the.# actual cpu..#.# <2> The hp/solaris 32/64 bit builds of the core cannot be.# distinguished by looking at tcl_platform. As packages have to.# match the 32/64 information we have to look in more places. In.# this case we inspect the executable itself (magic numbers,.# i.e. fileutil::magic::filetype)..#.# The basic information used comes out of the 'os' and 'machine'.# entries of the 'tcl_platform' array. A number of general and.# os/machine specific
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5977
                                                                                      Entropy (8bit):4.79231401569641
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:Wo05xaJIrnU0gEMydSv+lrnU0gEMPdSvfSrnUN4y1mP3jm5Q1/I+gYQ1KyHe36mV:Wo05xaJsnU0DMAK+5nU0DMFKfunUN4Oc
                                                                                      MD5:2A8B773513480EFA986D9CE061218348
                                                                                      SHA1:85763F378A68BA6A1EEE9887CDCF34C14D3AD5BF
                                                                                      SHA-256:2F812A0550716B88930174A8CA245698427CD286680C0968558AE269AB52440D
                                                                                      SHA-512:D3EC3891CC897A8ABB949EBA6A055D9283BA6E491E1CAEA132D894E7B3FD3B159E8226E0BBCDF369DB3F0E00AA1E0347E5B1838353E75B8AE114A83016010238
                                                                                      Malicious:false
                                                                                      Preview:.# -*- tcl -*-.# ### ### ### ######### ######### #########.## Overview..# Higher-level commands which invoke the functionality of this package.# for an arbitrary tcl shell (tclsh, wish, ...). This is required by a.# repository as while the tcl shell executing packages uses the same.# platform in general as a repository application there can be.# differences in detail (i.e. 32/64 bit builds)...# ### ### ### ######### ######### #########.## Requirements..package require platform.namespace eval ::platform::shell {}..# ### ### ### ######### ######### #########.## Implementation..# -- platform::shell::generic..proc ::platform::shell::generic {shell} {. # Argument is the path to a tcl shell... CHECK $shell. LOCATE base out.. set code {}. # Forget any pre-existing platform package, it might be in. # conflict with this one.. lappend code {package forget platform}. # Inject our platform package. lappend code [list source $base]. # Query and print the architectu
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):33935
                                                                                      Entropy (8bit):4.898273709861797
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:joWBAxonz0L7KILBk0U8Vl9NFljRFpGA1TrPiBDxDFP8sCNl:MWBAxgzY7KIL7j1NFl1Fp11/PiBVBksU
                                                                                      MD5:DB52847C625EA3290F81238595A915CD
                                                                                      SHA1:45A4ED9B74965E399430290BCDCD64ACA5D29159
                                                                                      SHA-256:4FDF70FDCEDEF97AA8BD82A02669B066B5DFE7630C92494A130FC7C627B52B55
                                                                                      SHA-512:5A8FB4ADA7B2EFBF1CADD10DBE4DC7EA7ACD101CB8FD0B80DAD42BE3ED8804FC8695C53E6AEEC088C2D4C3EE01AF97D148B836289DA6E4F9EE14432B923C7E40
                                                                                      Malicious:false
                                                                                      Preview:# msgcat.tcl --.#.#.This file defines various procedures which implement a.#.message catalog facility for Tcl programs. It should be.#.loaded with the command "package require msgcat"..#.# Copyright (c) 2010-2015 by Harald Oehlmann..# Copyright (c) 1998-2000 by Ajuba Solutions..# Copyright (c) 1998 by Mark Harrison..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...package require Tcl 8.5-.# When the version number changes, be sure to update the pkgIndex.tcl file,.# and the installation directory in the Makefiles..package provide msgcat 1.6.1..namespace eval msgcat {. namespace export mc mcexists mcload mclocale mcmax mcmset mcpreferences mcset\. mcunknown mcflset mcflmset mcloadedlocales mcforgetpackage\.. mcpackageconfig mcpackagelocale.. # Records the list of locales to search. variable Loclist {}.. # List of currently loaded locales. variable LoadedLocales {}.. # Rec
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):101389
                                                                                      Entropy (8bit):4.78335748687105
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:r3UFHL/k3tqN0E7NkhtMcrQ3qoyX2/2rCmTMttfN/CrQnXcwIHmlDB/mizvB21J1:r3UdOAVfnPIHmlDFmiDB21cK/xasmhC
                                                                                      MD5:D34207F736FA9FC26785A4D87C867A44
                                                                                      SHA1:24E533DDD16C67E0D0B9ED303A40C9D90ABF3E80
                                                                                      SHA-256:3BFD9E06826C98490E22B00200488D06C1FE49E3B78E24E985ABC377B04021FE
                                                                                      SHA-512:1007E5812CBF7D907E33FD769FDC4E9A9D0E68852E91208F5C887A2A86849AF69A11CE4B00358059193A46D17F19C26A255A22C107D30433482A8A0CE7ED0D03
                                                                                      Malicious:false
                                                                                      Preview:# tcltest.tcl --.#.#.This file contains support code for the Tcl test suite. It.# defines the tcltest namespace and finds and defines the output.# directory, constraints available, output and error channels,.#.etc. used by Tcl tests. See the tcltest man page for more.#.details..#.# This design was based on the Tcl testing approach designed and.# initially implemented by Mary Ann May-Pumphrey of Sun.#.Microsystems..#.# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 1998-1999 by Scriptics Corporation..# Copyright (c) 2000 by Ajuba Solutions.# Contributions from Don Porter, NIST, 2002. (not subject to US copyright).# All rights reserved...package require Tcl 8.5-..;# -verbose line uses [info frame].namespace eval tcltest {.. # When the version number changes, be sure to update the pkgIndex.tcl file,. # and the install directory in the Makefiles. When the minor version. # changes (new feature) be sure to update the man page as well..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):108619
                                                                                      Entropy (8bit):4.834993492587442
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:nFRYkDjVePrJwFR09W9JXvfM/2QXjjCV4ScA4MaLm1r:nF2wjVePrJyRpXv9+CV4S74rLg
                                                                                      MD5:E9C1DBACE852DE98ECC8906918C3167A
                                                                                      SHA1:A3CECEC2C8E67EB0BFCAA6E0DF8970440C29175F
                                                                                      SHA-256:D66A3E47106268C4FDE02F857EFDBBC9C44C9BFC6246B7678919F6DAD3C3B68D
                                                                                      SHA-512:C830CCA95D8EF2476BFD1B8AA8D0BBD8C557C44989D7398991716DE6F20C075A7FB321ABC0E48A1E5DDF8B4228444678D08761A5FA9D3C417CD58718235F0937
                                                                                      Malicious:false
                                                                                      Preview:# http.tcl --.#.#.Client-side HTTP for GET, POST, and HEAD commands. These routines can.#.be used in untrusted code that uses the Safesock security policy..#.These procedures use a callback interface to avoid using vwait, which.#.is not defined in the safe base..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES...package require Tcl 8.6-.# Keep this in sync with pkgIndex.tcl and with the install directories in.# Makefiles.package provide http 2.9.0..namespace eval http {. # Allow resourcing to not clobber existing data.. variable http. if {![info exists http]} {..array set http {.. -accept */*.. -pipeline 1.. -postfresh 0.. -proxyhost {}.. -proxyport {}.. -proxyfilter http::ProxyRequired.. -repost 0.. -urlencoding utf-8.. -zip 1..}..# We need a useragent string of this style or various servers will..# refuse to send us compressed content even when we ask for it. This..#
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):21148
                                                                                      Entropy (8bit):4.7268785966563405
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:vyPcB5RJtAZ7SP9nYP9I5HU3mOuWzXBEWKYHEN+7yBtYSbI0QD+lM:AcB5RJtAFSPBYPN3mOuiVHEN+78YSbqT
                                                                                      MD5:5E9B3E874F8FBEAADEF3A004A1B291B5
                                                                                      SHA1:B356286005EFB4A3A46A1FDD53E4FCDC406569D0
                                                                                      SHA-256:F385515658832FEB75EE4DCE5BD53F7F67F2629077B7D049B86A730A49BD0840
                                                                                      SHA-512:482C555A0DA2E635FA6838A40377EEF547746B2907F53D77E9FFCE8063C1A24322D8FAA3421FC8D12FDCAFF831B517A65DAFB1CEA6F5EA010BDC18A441B38790
                                                                                      Malicious:false
                                                                                      Preview:# auto.tcl --.#.# utility procs formerly in init.tcl dealing with auto execution of commands.# and can be auto loaded themselves..#.# Copyright (c) 1991-1993 The Regents of the University of California..# Copyright (c) 1994-1998 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# auto_reset --.#.# Destroy all cached information for auto-loading and auto-execution, so that.# the information gets recomputed the next time it's needed. Also delete any.# commands that are listed in the auto-load index..#.# Arguments:.# None...proc auto_reset {} {. global auto_execs auto_index auto_path. if {[array exists auto_index]} {..foreach cmdName [array names auto_index] {.. set fqcn [namespace which $cmdName].. if {$fqcn eq ""} {...continue.. }.. rename $fqcn {}..}. }. unset -nocomplain auto_execs auto_index ::tcl::auto_oldpath. if {[catch {llength $auto_path}]} {..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):128934
                                                                                      Entropy (8bit):5.001022641779315
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:6klVEuSDFeEzGtdaui+urVke5i1IsQ5SvtTImhrYnPrzAvtt2eyw7uZH/SOyQasa:yDFeEzMaui+urVke5i1R6SvtTImhrYPK
                                                                                      MD5:F1E825244CC9741595F47F4979E971A5
                                                                                      SHA1:7159DD873C567E10CADAF8638D986FFE11182A27
                                                                                      SHA-256:F0CF27CB4B5D9E3B5D7C84B008981C8957A0FF94671A52CC6355131E55DD59FB
                                                                                      SHA-512:468C881EB7CE92C91F28CAE2471507A76EF44091C1586DCD716309E3252ED00CCB847EC3296C1954CA6F965161664F7BB73F21A24B9FF5A86F625C0B67C74F67
                                                                                      Malicious:false
                                                                                      Preview:#----------------------------------------------------------------------.#.# clock.tcl --.#.#.This file implements the portions of the [clock] ensemble that are.#.coded in Tcl. Refer to the users' manual to see the description of.#.the [clock] command and its subcommands..#.#.#----------------------------------------------------------------------.#.# Copyright (c) 2004,2005,2006,2007 by Kevin B. Kenny.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#.#----------------------------------------------------------------------..# We must have message catalogs that support the root locale, and we need.# access to the Registry on Windows systems...uplevel \#0 {. package require msgcat 1.6. if { $::tcl_platform(platform) eq {windows} } {..if { [catch { package require registry 1.1 }] } {.. namespace eval ::tcl::clock [list variable NoRegistry {}]..}. }.}..# Put the library directory into the namespace
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):2.009389929214244
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:5TUvEESVrVJ/eyN9j233V2NdWTeVCT0VbsV7EV7sYnVAMmVZyg851VqxsGkl/:5TUmJvRju3ShVbsZiAMiZyb7PF
                                                                                      MD5:68D69C53B4A9F0AABD60646CA7E06DAE
                                                                                      SHA1:DD83333DC1C838BEB9102F063971CCC20CC4FD80
                                                                                      SHA-256:294C97175FD0894093B866E73548AE660AEED0C3CC1E73867EB66E52D34C0DD2
                                                                                      SHA-512:48960E838D30401173EA0DF8597BB5D9BC3A09ED2CFFCB774BA50CB0B2ACCF47AAD3BA2782B3D4A92BEF572CBD98A3F4109FC4344DB82EB207BFDE4F61094D72
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: ascii, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):92873
                                                                                      Entropy (8bit):3.255311357682213
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:3kkmY4kD7HGJxYXIdjQWTGzvKHBDViIM1sbh+dJE+FKw0sXlWVvDg21jj9:cGfKqIQCGzv8D7ksb2Ur79jj9
                                                                                      MD5:9E67816F304FA1A8E20D2270B3A53364
                                                                                      SHA1:9E35EBF3D5380E34B92FE2744124F9324B901DD3
                                                                                      SHA-256:465AE2D4880B8006B1476CD60FACF676875438244C1D93A7DBE4CDE1035E745F
                                                                                      SHA-512:EE529DA3511EB8D73465EB585561D54833C46B8C31062299B46F5B9EE7EB5BE473E630AA264F45B2806FC1B480C8ED39A173FF1756CB6401B363568E951F0637
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: big5, multi-byte.M.003F 0 89.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.00000000000000000000000000000000000000000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.286986942547087
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CqTUmJvRju3ShVbsZiAMiZyb7Ptuja5z8twsDO4yT2H:JgmOEVIwAMiw/Ptuja5z8RDtyT2H
                                                                                      MD5:79ACD9BD261A252D93C9D8DDC42B8DF6
                                                                                      SHA1:FA2271030DB9005D71FAAD60B44767955D5432DD
                                                                                      SHA-256:1B42DF7E7D6B0FEB17CB0BC8D97E6CE6899492306DD880C48A39D1A2F0279004
                                                                                      SHA-512:607F21A84AE569B19DF42463A56712D232CA192E1827E53F3ACB46D373EF4165A38FFBF116E28D4EAAEF49B08F6162C7A1C517CCE2DFACA71DA07193FEFFFF06
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp1250, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.288070862623515
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CTTUmJvRju3ShVbsZiAMiZyb7P4DRrwFsC/+H+SAJlM9aHe3cmx:wgmOEVIwAMiw/PStwFz/T5+smx
                                                                                      MD5:55FB20FB09C610DB38C22CF8ADD4F7B8
                                                                                      SHA1:604396D81FD2D90F5734FE6C3F283F8F19AABB64
                                                                                      SHA-256:2D1BED2422E131A140087FAF1B12B8A46F7DE3B6413BAE8BC395C06F0D70B9B0
                                                                                      SHA-512:07C6640BB40407C384BCF646CC436229AEC77C6398D57659B739DC4E180C81A1524F55A5A8F7B3F671A53320052AD888736383486CC01DFC317029079B17172E
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp1251, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.2209074629945476
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:C4TUmJvRju3ShVbsZiAMiZyb7PMmVurcNvPNNAkbnMH+tjg:rgmOEVIwAMiw/PMhrUok7zE
                                                                                      MD5:5900F51FD8B5FF75E65594EB7DD50533
                                                                                      SHA1:2E21300E0BC8A847D0423671B08D3C65761EE172
                                                                                      SHA-256:14DF3AE30E81E7620BE6BBB7A9E42083AF1AE04D94CF1203565F8A3C0542ACE0
                                                                                      SHA-512:EA0455FF4CD5C0D4AFB5E79B671565C2AEDE2857D534E1371F0C10C299C74CB4AD113D56025F58B8AE9E88E2862F0864A4836FED236F5730360B2223FDE479DC
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp1252, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.20AC0081201A0192201E20262020202102C62030016020390152008D017D008F.009020182019201C201D20222013201402DC21220161203A0153009D017E0178.00A000A100A200A300A400A500A600A700A800A900AA00AB00AC00AD00AE00AF.00B000B100B200B300B400B500B600B700B800B900BA00BB00BC00BD00BE00BF.00C000C100C200C300C400C500C600C700C800C900CA00CB00CC00CD00CE00CF.00D000D100D200D300D400D500D600D700D800D900DA00DB00DC00DD00DE00DF.00E000E100E200E300E400E500E600E700E800E
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.3530146237761445
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CRTUmJvRju3ShVbsZiAMiZyb7PMuW24OrKUQQSqJWeIDmq:CgmOEVIwAMiw/PMuW2nKJQSqJWeI1
                                                                                      MD5:2E5F553D214B534EBA29A9FCEEC36F76
                                                                                      SHA1:8FF9A526A545D293829A679A2ECDD33AA6F9A90E
                                                                                      SHA-256:2174D94E1C1D5AD93717B9E8C20569ED95A8AF51B2D3AB2BCE99F1A887049C0E
                                                                                      SHA-512:44AB13C0D322171D5EE62946086058CF54963F91EC3F899F3A10D051F9828AC66D7E9F8055026E938DDD1B97A30D5D450B89D72F9113DEE2DBBB62DDBBBE456C
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp1253, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.2357714075228494
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CWTUmJvRju3ShVbsZiAMiZyb7PMSrcmvPNNAkKMH+tZL/M:lgmOEVIwAMiw/PMSrrokKzR0
                                                                                      MD5:35AD7A8FC0B80353D1C471F6792D3FD8
                                                                                      SHA1:484705A69596C9D813EA361625C3A45C6BB31228
                                                                                      SHA-256:BC4CBE4C99FD65ABEA45FBDAF28CC1D5C42119280125FBBD5C2C11892AE460B2
                                                                                      SHA-512:CCA3C6A4B826E0D86AC10E45FFC6E5001942AA1CF45B9E0229D56E06F2600DDA0139764F1222C56CF7A9C14E6E6C387F9AB265CB9B936E803FECD8285871C70F
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp1254, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.20AC0081201A0192201E20262020202102C62030016020390152008D008E008F.009020182019201C201D20222013201402DC21220161203A0153009D009E0178.00A000A100A200A300A400A500A600A700A800A900AA00AB00AC00AD00AE00AF.00B000B100B200B300B400B500B600B700B800B900BA00BB00BC00BD00BE00BF.00C000C100C200C300C400C500C600C700C800C900CA00CB00CC00CD00CE00CF.011E00D100D200D300D400D500D600D700D800D900DA00DB00DC0130015E00DF.00E000E100E200E300E400E500E600E700E800E
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.267336792625871
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CfTUmJvRju3ShVbsZiAMiZyb7PMI22iEePlNQhv6l50b:MgmOEVIwAMiw/PMI27EsQhvgg
                                                                                      MD5:0419DBEE405723E7A128A009DA06460D
                                                                                      SHA1:660DBE4583923CBDFFF6261B1FADF4349658579C
                                                                                      SHA-256:F8BD79AE5A90E5390D77DC31CB3065B0F93CB8813C9E67ACCEC72E2DB2027A08
                                                                                      SHA-512:FDD9F23A1B5ABBF973BEE28642A7F28F767557FE842AF0B30B1CF97CD258892F82E547392390A51900DC7FF5D56433549A5CB463779FC131E885B00568F86A32
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp1255, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.3332869352420795
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:C0TUmJvRju3ShVbsZiAMiZyb7Ps0pPESLym/cwPm+ZMZjyco/fQIG/h:XgmOEVIwAMiw/Ps0FPLym/AsBfg/h
                                                                                      MD5:0FFA293AA50AD2795EAB7A063C4CCAE5
                                                                                      SHA1:38FEE39F44E14C3A219978F8B6E4DA548152CFD6
                                                                                      SHA-256:BBACEA81D4F7A3A7F3C036273A4534D31DBF8B6B5CCA2BCC4C00CB1593CF03D8
                                                                                      SHA-512:AB4A6176C8C477463A6CABD603528CEB98EF4A7FB9AA6A8659E1AA6FE3F88529DB9635D41649FBAD779AEB4413F9D8581E6CA078393A3042B468E8CAE0FA0780
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp1256, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.2734430397929604
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CNTUmJvRju3ShVbsZiAMiZyb7PtuWTfN641PaxUVG4da:ugmOEVIwAMiw/PtuWkgVfa
                                                                                      MD5:A1CCD70248FEA44C0EBB51FB71D45F92
                                                                                      SHA1:CC103C53B3BA1764714587EAEBD92CD1BC75194D
                                                                                      SHA-256:4151434A714FC82228677C39B07908C4E19952FC058E26E7C3EBAB7724CE0C77
                                                                                      SHA-512:74E4A13D65FAB11F205DB1E6D826B06DE421282F7461B273196FD7EECEE123EA0BD32711640B15B482C728966CC0C70FFC67AEDAD91566CA87CD623738E34726
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp1257, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.226508038800896
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CKlTUmJvRju3ShVbsZiAMiZyb7PMIX2jmvPNNXkohWiZo//:xgmOEVIwAMiw/PMIXXfkohnun
                                                                                      MD5:BB010BFF4DD16B05EEB6E33E5624767A
                                                                                      SHA1:6294E42ED22D75679FF1464FF41D43DB3B1824C2
                                                                                      SHA-256:0CDB59E255CCD7DCF4AF847C9B020AEAEE78CE7FCF5F214EBCF123328ACF9F24
                                                                                      SHA-512:2CD34F75DC61DC1495B0419059783A5579932F43DB9B125CADCB3838A142E0C1CD7B42DB71EF103E268206E31099D6BB0670E84D5658C0E18D0905057FF87182
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp1258, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.20AC0081201A0192201E20262020202102C62030008A20390152008D008E008F.009020182019201C201D20222013201402DC2122009A203A0153009D009E0178.00A000A100A200A300A400A500A600A700A800A900AA00AB00AC00AD00AE00AF.00B000B100B200B300B400B500B600B700B800B900BA00BB00BC00BD00BE00BF.00C000C100C2010200C400C500C600C700C800C900CA00CB030000CD00CE00CF.011000D1030900D300D401A000D600D700D800D900DA00DB00DC01AF030300DF.00E000E100E2010300E400E500E600E700E800E
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.447501009231115
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CFyTUmJvRju3ShVbsZiAMiZyb7P4jpuKBIrRjK8DvmH:wygmOEVIwAMiw/PYwjKgmH
                                                                                      MD5:8645C2DFCC4D5DAD2BCD53A180D83A2F
                                                                                      SHA1:3F725245C66050D39D9234BAACE9D047A3842944
                                                                                      SHA-256:D707A1F03514806E714F01CBFCB7C9F9973ACDC80C2D67BBD4E6F85223A50952
                                                                                      SHA-512:208717D7B1CBDD8A0B8B3BE1B6F85353B5A094BDC370E6B8396158453DD7DC400EE6C4D60490AD1A1F4C943E733298FC971AE30606D6BAB14FB1290B886C76D0
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp437, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.551534707521956
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CjTUmJvRju3ShVbsZiAMiZyb7P48KhQFhWeYDr1K8DZckbiY:WgmOEVIwAMiw/P9KhQFhWeY31Kk2Y
                                                                                      MD5:C68ADEFE02B77F6E6B5217CD83D46406
                                                                                      SHA1:C95EA4ED3FBEF013D810C0BFB193B15FA8ADE7B8
                                                                                      SHA-256:8BFCA34869B3F9A3B2FC71B02CBAC41512AF6D1F8AB17D2564E65320F88EDE10
                                                                                      SHA-512:5CCAACD8A9795D4FE0FD2AC6D3E33C10B0BCC43B29B45DFBA66FBD180163251890BB67B8185D806E4341EB01CB1CED6EA682077577CC9ED948FC094B099A662A
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp737, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.3818286672990854
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CsOTUmJvRju3ShVbsZiAMiZyb7P4DBcqb67JnsUgqIPfJ:AgmOEVIwAMiw/PSzb67NsrLPR
                                                                                      MD5:DE1282E2925870A277AF9DE4C52FA457
                                                                                      SHA1:F4301A1340A160E1F282B5F98BF9FACBFA93B119
                                                                                      SHA-256:44FB04B5C72B584B6283A99B34789690C627B5083C5DF6E8B5B7AB2C68903C06
                                                                                      SHA-512:08173FC4E5FC9AA9BD1E296F299036E49C0333A876EA0BDF40BEC9F46120329A530B6AA57B32BC83C7AA5E6BD20DE9F616F4B17532EE54634B6799C31D8F668F
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp775, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.301196372002172
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:C9TUmJvRju3ShVbsZiAMiZyb7P4jpuKBc+mTRF5aefDT4HJ:EgmOEVIwAMiw/PYelF5xfn4p
                                                                                      MD5:FF3D96C0954843C7A78299FED6986D9E
                                                                                      SHA1:5EAD37788D124D4EE49EC4B8AA1CF6AAA9C2849C
                                                                                      SHA-256:55AA2D13B789B3125F5C9D0DC5B6E3A90D79426D3B7825DCD604F56D4C6E36A2
                                                                                      SHA-512:B76CD82F3204E17D54FB679615120564C53BBE27CC474101EE073EFA6572B50DB2E9C258B09C0F7EAE8AC445D469461364C81838C07D41B43E353107C06C247E
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp850, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.3816687566591797
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CPTUmJvRju3ShVbsZiAMiZyb7P4OvEUs5ycHQjc59X/C:mgmOEVIwAMiw/Pkv5ycHQjc59Xa
                                                                                      MD5:25A59EA83B8E9F3322A54B138861E274
                                                                                      SHA1:904B357C30603DFBCF8A10A054D9399608B131DF
                                                                                      SHA-256:5266B6F18C3144CFADBCB7B1D27F0A7EAA1C641FD3B33905E42E4549FD373770
                                                                                      SHA-512:F7E41357849599E7BA1D47B9B2E615C3C2EF4D432978251418EBF9314AAEB0E1B0A56ED14ED9BA3BE46D3DABE5DD80E0CA6592AE88FB1923E7C3D90D7F846709
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp852, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.3580450853378596
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CoTUmJvRju3ShVbsZiAMiZyb7P4hHVLjwk6rMZCb32SLauDbr:hgmOEVIwAMiw/PM/wcMb3VuuT
                                                                                      MD5:0220F1955F01B676D2595C30DEFB6064
                                                                                      SHA1:F8BD4BF6D95F672CB61B8ECAB580A765BEBDAEA5
                                                                                      SHA-256:E3F071C63AC43AF66061506EF2C574C35F7BF48553FB5158AE41D9230C1A10DF
                                                                                      SHA-512:F7BFF7D6534C9BFDBF0FB0147E31E948F60E933E6DA6A39E8DC62CC55FEBDD6901240460D7B3C0991844CDEE7EB8ED26E5FDBBC12BDC9B8173884D8FCA123B69
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp855, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.2936796452153128
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CaTUmJvRju3ShVbsZiAMiZyb7P4jpu6u/5WH5aeoC4ljIJ:jgmOEVIwAMiw/Pr/UH5xp4l6
                                                                                      MD5:58C52199269A3BB52C3E4C20B5CE6093
                                                                                      SHA1:888499D9DFDF75C60C2770386A4500F35753CE70
                                                                                      SHA-256:E39985C6A238086B54427475519C9E0285750707DB521D1820E639723C01C36F
                                                                                      SHA-512:754667464C4675E8C8F2F88A9211411B3648068085A898D693B33BF3E1FAECC9676805FD2D1A4B19FAAB30E286236DCFB2FC0D498BF9ABD9A5E772B340CEE768
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp857, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.438607583601603
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CMTUmJvRju3ShVbsZiAMiZyb7P4Aj4AxOt49+nK8DvmH:VgmOEVIwAMiw/PeR+snKgmH
                                                                                      MD5:8CA7C4737A18D5326E9A437D5ADC4A1A
                                                                                      SHA1:C6B1E9320EEF46FC9A23437C255E4085EA2980DB
                                                                                      SHA-256:6DB59139627D29ABD36F38ED2E0DE2A6B234A7D7E681C7DBAF8B888F1CAC49A5
                                                                                      SHA-512:2D2427E7A3FF18445321263A42C6DA560E0250691ACBE5113BDE363B36B5E9929003F3C91769A02FF720AB8261429CBFA9D9580C1065FFE77400327B1A5539A6
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp860, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.4494568686644276
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:ClTUmJvRju3ShVbsZiAMiZyb7P4jpOkPn9R2GRK8DvmH:8gmOEVIwAMiw/PAPXvKgmH
                                                                                      MD5:45F0D888DBCB56703E8951C06CFAED51
                                                                                      SHA1:53529772EA6322B7949DB73EEBAED91E5A5BA3DA
                                                                                      SHA-256:A43A5B58BFC57BD723B12BBDEA9F6E1A921360B36D2D52C420F37299788442D3
                                                                                      SHA-512:61D0C361E1C7D67193409EC327568867D1FD0FE448D11F16A08638D3EE31BE95AD37B8A2E67B8FB448D09489AA3F5D65AD9AC18E9BDC690A049F0C015BA806F1
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp861, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.4900477558394694
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CdMTUmJvRju3ShVbsZiAMiZyb7P4N6rRjK8DvmH:iMgmOEVIwAMiw/PljKgmH
                                                                                      MD5:E417DCE52E8438BBE9AF8AD51A09F9E3
                                                                                      SHA1:EF273671D46815F22996EA632D22CC27EB8CA44B
                                                                                      SHA-256:AEA716D490C35439621A8F00CA7E4397EF1C70428E206C5036B7AF25F1C3D82F
                                                                                      SHA-512:97D65E05008D75BC56E162D51AB76888E1FA0591D9642D7C0D09A5CE823904B5D6C14214828577940EDBE7F0265ABACDD67E4E12FACFDF5C7CD35FA80B90EC02
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp862, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.450081751310228
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CXTUmJvRju3ShVbsZiAMiZyb7P4aGuXVsq5RNK8DvmH:egmOEVIwAMiw/PT3VswKgmH
                                                                                      MD5:A2C4062EB4F37C02A45B13BD08EC1120
                                                                                      SHA1:7F6ED89BD0D415C64D0B8A037F08A47FEADD14C4
                                                                                      SHA-256:13B5CB481E0216A8FC28BFA9D0F6B060CDF5C457B3E12435CA826EB2EF52B068
                                                                                      SHA-512:95EFDA8CBC5D52E178640A145859E95A780A8A25D2AF88F98E8FFFA035016CABAE2259D22B3D6A95316F64138B578934FAF4C3403E35C4B7D42E0369B5D88C9B
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp863, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.6558830653506647
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CwTUmJvRju3YhVbsZiAMiZyb7P46SY927iqtcYQjDUjSD:5gmOqVIwAMiw/PCXjcYQfcSD
                                                                                      MD5:3C88BF83DBA99F7B682120FBEEC57336
                                                                                      SHA1:E0CA400BAE0F66EEBE4DFE147C5A18DD3B00B78C
                                                                                      SHA-256:E87EC076F950FCD58189E362E1505DD55B0C8F4FA7DD1A9331C5C111D2CE569F
                                                                                      SHA-512:6BD65D0A05F57333DA0078759DB2FC629B56C47DAB24E231DE41AD0DF3D07BF7A2A55D1946A7BA38BE228D415FB2BDB606BF1EF243974ED7DFD204548B2A43BA
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp864, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.00200021002200230024066A0026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.00B000B72219221A259225002502253C2524252C251C25342510250C25142518.03B2221E03C600B100BD00BC224800AB00BBFEF7FEF8009B009CFEFBFEFC009F.00A000ADFE8200A300A4FE8400000000FE8EFE8FFE95FE99060CFE9DFEA1FEA5.0660066106620663066406650666066706680669FED1061BFEB1FEB5FEB9061F.00A2FE80FE81FE83FE85FECAFE8BFE8DFE91FE93FE97FE9BFE9FFEA3FEA7FEA9.FEABFEADFEAFFEB3FEB7FEBBFEBFFEC1FEC5FECBFECF00A600AC00F700D7FEC9.0640FED3FED7FEDBFEDFFEE3FEE7FEEBFEEDFEEF
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.451408971174579
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CsKTUmJvRju3ShVbsZiAMiZyb7P4jpuKBn9RUK8DvmH:ggmOEVIwAMiw/PYRXUKgmH
                                                                                      MD5:6F290E2C3B8A8EE38642C23674B18C71
                                                                                      SHA1:0EB40FEEB8A382530B69748E08BF513124232403
                                                                                      SHA-256:407FC0FE06D2A057E9BA0109EA9356CAB38F27756D135EF3B06A85705B616F50
                                                                                      SHA-512:A975F69360A28484A8A3B4C93590606B8F372A27EC612ECC2355C9B48E042DCE132E64411CF0B107AA5566CAF6954F6937BEBFE17A2AE79EFF25B67FA0F88B7D
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp865, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.435639928335435
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CCTUmJvRju3ShVbsZiAMiZyb7P4GE+SAJlM9aHe3cIK8D/eke:bgmOEVIwAMiw/Pr5+sIK8ev
                                                                                      MD5:C612610A7B63519BB7FEFEE26904DBB5
                                                                                      SHA1:431270939D3E479BF9B9A663D9E67FCEBA79416F
                                                                                      SHA-256:82633643CD326543915ACC5D28A634B5795274CD39974D3955E51D7330BA9338
                                                                                      SHA-512:A3B84402AB66B1332C150E9B931E75B401378DDB4378D993DD460C81909DB72F2D136F0BE7B014F0A907D9EF9BE541C8E0B42CAB01667C6EF17E1DE1E0A3D0AE
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp866, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0410041104120413041404150416041704180419041A041B041C041D041E041F.0420042104220423042404250426042704280429042A042B042C042D042E042F.0430043104320433043404350436043704380439043A043B043C043D043E043F.259125922593250225242561256225562555256325512557255D255C255B2510.25142534252C251C2500253C255E255F255A25542569256625602550256C2567.2568256425652559255825522553256B256A2518250C25882584258C25902580.0440044104420443044404450446044704480449
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.458262128093304
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CtTUmJvRju3ShVbsZiAMiZyb7P4UN+lhNo5+8dKfQFhWGDrjz9:EgmOEVIwAMiw/PxYNo5+8dKfQFhWG3jZ
                                                                                      MD5:51B18570775BCA6465BD338012C9099C
                                                                                      SHA1:E8149F333B1809DCCDE51CF8B6332103DDE7FC30
                                                                                      SHA-256:27F16E3DD02B2212C4980EA09BDC068CF01584A1B8BB91456C03FCABABE0931E
                                                                                      SHA-512:EB285F0E5A9333FFF0E3A6E9C7CAC9D44956EDF180A46D623989A93683BC70EE362256B58EB9AED3BFC6B5C8F5DB4E42540DFC681D51D22A97398CD18F76A1E1
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp869, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080008100820083008400850386008700B700AC00A620182019038820150389.038A03AA038C00930094038E03AB00A9038F00B200B303AC00A303AD03AE03AF.03CA039003CC03CD039103920393039403950396039700BD0398039900AB00BB.25912592259325022524039A039B039C039D256325512557255D039E039F2510.25142534252C251C2500253C03A003A1255A25542569256625602550256C03A3.03A403A503A603A703A803A903B103B203B32518250C2588258403B403B52580.03B603B703B803B903BA03BB03BC03BD03BE03BF
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1090
                                                                                      Entropy (8bit):3.2660589395582478
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:CSyTUmJvRju3ShVbsZiAMiZyb7PQXzHmED43U/TW5dV:CgmOEVIwAMiw/PIr43UKV
                                                                                      MD5:7884C95618EF4E9BAA1DED2707F48467
                                                                                      SHA1:DA057E1F93F75521A51CC725D47130F41E509E70
                                                                                      SHA-256:3E067363FC07662EBE52BA617C2AAD364920F2AF395B3416297400859ACD78BB
                                                                                      SHA-512:374AA659A8DB86C023187D02BD7993516CE0EC5B4C6743AD4956AA2DDB86D2B4A57B797253913E08E40485BF3263FBD1C74DDE2C00E6F228201811ED89A6DFF0
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp874, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):48207
                                                                                      Entropy (8bit):3.450462303370557
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:LhuW1PJnT9TO7RaQiPCLUKr7KBi9FrOLdtZ7RkEw:LZPV9KuqTxFGXZlQ
                                                                                      MD5:AA4398630883066C127AA902832C82E4
                                                                                      SHA1:D0B3DEB0EE6539CE5F28A51464BFBB3AA03F28E5
                                                                                      SHA-256:9D33DF6E1CFDD2CF2553F5E2758F457D710CAFF5F8C69968F2665ACCD6E9A6FD
                                                                                      SHA-512:77794E74B0E6B5855773EE9E1F3B1DA9DB7661D66485DAE6F61CA69F6DA9FD308A55B3A76C9B887135949C60FC3888E6F9A45C6BC481418737AA452A0D9CAE64
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp932, multi-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):132509
                                                                                      Entropy (8bit):3.458586416034501
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:JUbXcUPivzybu9VBPbUQMp8nDr+VFQQHkrUkAEAd4WD7tH8dd1+a:muVDQEr2dhDBH8d3+a
                                                                                      MD5:27280A39A06496DE6035203A6DAE5365
                                                                                      SHA1:3B1D07B02AE7E3B40784871E17F36332834268E6
                                                                                      SHA-256:619330192984A80F93AC6F2E4E5EAA463FD3DDDC75C1F65F3975F33E0DD7A0BB
                                                                                      SHA-512:EA05CC8F9D6908EE2241E2A72374DAAD55797B5A487394B4C2384847C808AF091F980951941003039745372022DE88807F93EEF6CDB3898FBB300A48A09B66E8
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp936, multi-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):130423
                                                                                      Entropy (8bit):3.0309641114333425
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:fimT/rTarSdgL6MVTCwCWUw62Ljv10xb+KYTuHEh:ftT/IQYLzGxSdCy
                                                                                      MD5:6788B104D2297CBD8D010E2776AF6EBA
                                                                                      SHA1:904A8B7846D34521634C8C09013DBB1D31AF47CA
                                                                                      SHA-256:26BCB620472433962717712D04597A63264C8E444459432565C4C113DE0A240B
                                                                                      SHA-512:0DF73561B76159D0A94D16A2DAB22F2B3D88C67146A840CB74D19E70D50A4C7E4DDF1952B5B805471985A896CA9F1B69C3FC4E6D8D17454566D7D39377BA1394
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp949, multi-byte.M.003F 0 125.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.000000000000000000000000000000000000000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):91831
                                                                                      Entropy (8bit):3.253346615914323
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:VkkmY4kD7HGJxYXIdjQW7GzvKHBDViIM1sbh+dJE+FKw0sXlWVvDg21jjA:mGfKqIQwGzv8D7ksb2Ur79jjA
                                                                                      MD5:A0F8C115D46D02A5CE2B8C56AFF53235
                                                                                      SHA1:6605FCCB235A08F9032BB45231B1A6331764664B
                                                                                      SHA-256:1FB9A3D52D432EA2D6CD43927CEBF9F58F309A236E1B11D20FE8D5A5FB944E6E
                                                                                      SHA-512:124EA2134CF59585DB2C399B13DE67089A6BB5412D2B210DF484FA38B77555AAF0605D04F441BDC2B0BE0F180FA17C145731D7826DA7556A573D357CC00A968F
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: cp950, multi-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1093
                                                                                      Entropy (8bit):3.7149721845090347
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:vJM0UmJvRjuyfqYCsUBOdXBCbtwHviANskfUPiXFtoE4OSFgHrBPkq:vKfmOEqYCs6CXRPiANIiXFt9XSMdPH
                                                                                      MD5:7715CC78774FEA9EB588397D8221FA5B
                                                                                      SHA1:6A21D57B44A0856ABCDE61B1C16CB93F4E4C3D74
                                                                                      SHA-256:3BDE9AE7EAF9BE799C84B2AA4E80D78BE8ACBACA1E486F10B9BDD42E3AEDDCB2
                                                                                      SHA-512:C7500B9DD36F7C92C1A92B8F7BC507F6215B12C26C8CB4564A8A87299859C29C05DEFD3212DE8F2DB76B7DFAB527D6C7B10D1E9A9F6B682F1B5BC4911CFAD26C
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: dingbats, single-byte.S.003F 1 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.00202701270227032704260E2706270727082709261B261E270C270D270E270F.2710271127122713271427152716271727182719271A271B271C271D271E271F.2720272127222723272427252726272726052729272A272B272C272D272E272F.2730273127322733273427352736273727382739273A273B273C273D273E273F.2740274127422743274427452746274727482749274A274B25CF274D25A0274F.27502751275225B225BC25C6275625D727582759275A275B275C275D275E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.0000276127622763276427652766276726632666266526602460246124622463.2464246524662467246824692776277727782779277A277B277C277D277E277F.2780278127822783278427852786278727882789278A278B278C278D278E278F.2790279127922793279421922194219527982799279A279B279C279D279E279F.27A027A127A227A327A427A527A627A727A82
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1054
                                                                                      Entropy (8bit):2.92745681322567
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:scICJZoBqoQzRKCGW5JyY9yZk3Vvd2p4Z4XgiAmV3q:JmqrRKCtEYYZk3V4WSwitV6
                                                                                      MD5:67212AAC036FE54C8D4CDCB2D03467A6
                                                                                      SHA1:465509C726C49680B02372501AF7A52F09AB7D55
                                                                                      SHA-256:17A7D45F3B82F2A42E1D36B13DB5CED077945A3E82700947CD1F803DD2A60DBF
                                                                                      SHA-512:9500685760800F5A31A755D582FCEDD8BB5692C27FEEEC2709D982C0B8FCB5238AFB310DCB817F9FE140086A8889B7C60D5D1017764CEB03CB388DD22C8E0B3E
                                                                                      Malicious:false
                                                                                      Preview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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):85574
                                                                                      Entropy (8bit):2.3109636068522357
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:SgOycCs6mBixg1k6y8NMSwR8JMvz6VaVZmASVHBtGtRfS7FXtQ/RSJj9fNLSmXn/:SdC4BmCkjSwAO6VIrahNrVNTSYG3Oln
                                                                                      MD5:9A60E5D1AB841DB3324D584F1B84F619
                                                                                      SHA1:BCCC899015B688D5C426BC791C2FCDE3A03A3EB5
                                                                                      SHA-256:546392237F47D71CEE1DAA1AAE287D94D93216A1FABD648B50F59DDCE7E8AE35
                                                                                      SHA-512:E9F42B65A8DFB157D1D3336A94A83D372227BAA10A82EB0C6B6FB5601AA352A576FA3CDFD71EDF74A2285ABCA3B1D3172BB4B393C05B3B4AB141AAF04B10F426
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: euc-cn, multi-byte.M.003F 0 82.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.000000000000000000000000000000000000000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):82537
                                                                                      Entropy (8bit):2.267779266005065
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:c7C2o8+/s5VHxANqsFvGFkMpUEg4MWv947ebZ745zIPcvZ3p6JhE1mrUH2xUoSuL:U+UTHxAlFxkUeGcOmaj6JhEMrUwLf3d1
                                                                                      MD5:453626980EB36062E32D98ACECCCBD6E
                                                                                      SHA1:F8FCA3985009A2CDD397CB3BAE308AF05B0D7CAC
                                                                                      SHA-256:3BFB42C4D36D1763693AEFCE87F6277A11AD5A756D691DEDA804D9D0EDCB3093
                                                                                      SHA-512:0F026E1EF3AE1B08BBC7050DB0B181B349511F2A526D2121A6100C426674C0FB1AD6904A5CC11AA924B7F03E33F6971599BAF85C94528428F2E22DCB7D6FE443
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: euc-jp, multi-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):93918
                                                                                      Entropy (8bit):2.3267174168729032
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:1/W3oNwgt2qyVY1OVxk6ZN4KYDN1uq44hohExh:1/W3pqv10xb+KYTuHEh
                                                                                      MD5:93FEADA4D8A974E90E77F6EB8A9F24AB
                                                                                      SHA1:89CDA4FE6515C9C03551E4E1972FD478AF3A419C
                                                                                      SHA-256:1F1AD4C4079B33B706E948A735A8C3042F40CC68065C48C220D0F56FD048C33B
                                                                                      SHA-512:7FC43C273F8C2A34E7AD29375A36B6CAC539AC4C1CDCECFAF0B366DCFE605B5D924D09DAD23B2EE589B1A8A63EE0F7A0CE32CE74AC873369DE8555C9E27A5EDF
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: euc-kr, multi-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):86619
                                                                                      Entropy (8bit):2.2972446758995697
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:XSeUMIZQkyMiS4Y3fPOYo55XVi684z6WwQrrNoTRoyzDciB126afGG9whRJGAy/I:XhcQjSr3XeXVbmWdWd/zl5auG2hU/I
                                                                                      MD5:12DBEEF45546A01E041332427FEC7A51
                                                                                      SHA1:5C8E691AE3C13308820F4CF69206D765CFD5094B
                                                                                      SHA-256:0C0DF17BFECE897A1DA7765C822453B09866573028CECCED13E2EFEE02BCCCC4
                                                                                      SHA-512:FC8A250EE17D5E94A765AFCD9464ECAE74A4E2FF594A8632CEAEC5C84A3C4D26599642DA42E507B7873C37849D3E784CFB0792DE5B4B4262428619D7473FF611
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: gb12345, double-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.1978221748141253
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:qrmTUmJvRju36hVbsZiAMiZyb7PN8pUPnfk5JM0RHFj:qSgmO8VIwAMiw/PNPQPFj
                                                                                      MD5:06645FE6C135D2EDE313629D24782F98
                                                                                      SHA1:49C663AC26C1FE4F0FD1428C9EF27058AEE6CA95
                                                                                      SHA-256:A2717AE09E0CF2D566C245DC5C5889D326661B40DB0D5D9A6D95B8E6B0F0E753
                                                                                      SHA-512:DB544CFE58753B2CF8A5D65321A2B41155FE2430DB6783DD2F20E1244657482072633D16C8AC99765C113B60E99C8718263C483763A34C5E4BB04B4FFBA41976
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: gb1988, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):84532
                                                                                      Entropy (8bit):2.3130049332819502
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:KSevutIzbwixZ1J9vS+MReR8cMvwKVDAcmaj8HEtG0waFtFsKQ2RzIjTfYahm6n3:Kat+wmTJYReltKVMeYkXOjYo5tG3VN+
                                                                                      MD5:BF74C90D28E52DD99A01377A96F462E3
                                                                                      SHA1:DBA09C670F24D47B95D12D4BB9704391B81DDA9A
                                                                                      SHA-256:EC11BFD49C715CD89FB9D387A07CF54261E0F4A1CCEC1A810E02C7B38AD2F285
                                                                                      SHA-512:8F5A86BB57256ED2412F6454AF06C52FB44C83EB7B820C642CA9216E9DB31D6EC22965BF5CB9E8AE4492C77C1F48EB2387B1CBDC80F6CDA33FA57C57EC9FF9CD
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: gb2312, double-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):85574
                                                                                      Entropy (8bit):2.3109636068522357
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:SgOycCs6mBixg1k6y8NMSwR8JMvz6VaVZmASVHBtGtRfS7FXtQ/RSJj9fNLSmXn/:SdC4BmCkjSwAO6VIrahNrVNTSYG3Oln
                                                                                      MD5:9A60E5D1AB841DB3324D584F1B84F619
                                                                                      SHA1:BCCC899015B688D5C426BC791C2FCDE3A03A3EB5
                                                                                      SHA-256:546392237F47D71CEE1DAA1AAE287D94D93216A1FABD648B50F59DDCE7E8AE35
                                                                                      SHA-512:E9F42B65A8DFB157D1D3336A94A83D372227BAA10A82EB0C6B6FB5601AA352A576FA3CDFD71EDF74A2285ABCA3B1D3172BB4B393C05B3B4AB141AAF04B10F426
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: euc-cn, multi-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):192
                                                                                      Entropy (8bit):4.915818681498601
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SOd5MNXVSVLqRIBXSl1AEXMV/RRDfANDemSjs5dqcRcRZMvs5BCUNZ:SVNFS01K+MtkvSjwqd9NZ
                                                                                      MD5:224219C864280FA5FB313ADBC654E37D
                                                                                      SHA1:39E20B41CFA8B269377AFA06F9C4D66EDD946ACB
                                                                                      SHA-256:E12928E8B5754D49D0D3E799135DE2B480BA84B5DBAA0E350D9846FA67F943EC
                                                                                      SHA-512:6E390D83B67E2FD5BCAC1BA603A9C6F8BE071FA64021612CE5F8EE33FD8E3840A8C31A7B00134A0039E46BDC66BEF7EB6EA1F8663BA72816B86AF792EF7BDC56
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso2022-jp, escape-driven.E.name..iso2022-jp.init..{}.final..{}.ascii..\x1b(B.jis0201..\x1b(J.jis0208..\x1b$B.jis0208..\x1b$@.jis0212..\x1b$(D.gb2312..\x1b$A.ksc5601..\x1b$(C.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):115
                                                                                      Entropy (8bit):4.945508829557185
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SOd5MNXVTEXIBXSl1AEXNELmUHhqQc6XfUNOvn:SVNFS1K+9Qc6sNA
                                                                                      MD5:F6464F7C5E3F642BC3564D59B888C986
                                                                                      SHA1:94C5F39256366ABB68CD67E3025F177F54ECD39D
                                                                                      SHA-256:6AC0F1845A56A1A537B9A6D9BCB724DDDF3D3A5E61879AE925931B1C0534FBB7
                                                                                      SHA-512:B9A7E0A9344D8E883D44D1A975A7C3B966499D34BA6206B15C90250F88A8FA422029CEF190023C4E4BE806791AC3BEA87FD8872B47185B0CE0F9ED9C38C41A84
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso2022-kr, escape-driven.E.name..iso2022-kr.init..\x1b$)C.final..{}.iso8859-1.\x0f.ksc5601..\x0e.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):226
                                                                                      Entropy (8bit):4.925633473589168
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SOd5MNXVUW+IBXSl1AEXM56DfqQc6WHmSjs5dReQSXcRcRZMvs5BCUNxXeR5IHRv:SVNFUX1K+M55Qc6WGSjwRDSXd9NGIHRv
                                                                                      MD5:745464FF8692E3C3D8EBBA38D23538C8
                                                                                      SHA1:9D6F077598A5A86E6EB6A4EEC14810BF525FBD89
                                                                                      SHA-256:753DDA518A7E9F6DC0309721B1FAAE58C9661F545801DA9F04728391F70BE2D0
                                                                                      SHA-512:E919677CC96DEF4C75126A173AF6C229428731AB091CDDBB2A6CE4EB82BCD8191CE64A33B418057A15E094A48E846BEE7820619E414E7D90EDA6E2B66923DDA5
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso2022, escape-driven.E.name..iso2022.init..{}.final..{}.iso8859-1.\x1b(B.jis0201..\x1b(J.gb1988..\x1b(T.jis0208..\x1b$B.jis0208..\x1b$@.jis0212..\x1b$(D.gb2312..\x1b$A.ksc5601..\x1b$(C.jis0208..\x1b&@\x1b$B.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1094
                                                                                      Entropy (8bit):3.163043970763833
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:iyTUmJvRju3ShVbsZiAMiZyb7P4UPvvPNNAkbnMH+tjg:iygmOEVIwAMiw/PTvok7zE
                                                                                      MD5:E3BAE26F5D3D9A4ADCF5AE7D30F4EC38
                                                                                      SHA1:A71B6380EA3D23DC0DE11D3B8CEA86A4C8063D47
                                                                                      SHA-256:754EF6BF3A564228AB0B56DDE391521DCC1A6C83CFB95D4B761141E71D2E8E87
                                                                                      SHA-512:AFED8F5FE02A9A30987736F08B47F1C19339B5410D6020CC7EA37EA0D717A70AF6CDDC775F53CE261FCF215B579206E56458D61AB4CEB44E060BD6B3AC2F4C41
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-1, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1095
                                                                                      Entropy (8bit):3.2483197762497458
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:jTUmJvRju3ShVbsZiAMiZyb7P4UP6L2yhBKyta:jgmOEVIwAMiw/PT6L2Ryta
                                                                                      MD5:162E76BD187CB54A5C9F0B72A082C668
                                                                                      SHA1:CEC787C4DE78F9DBB97B9C44070CF2C12A2468F7
                                                                                      SHA-256:79F6470D9BEBD30832B3A9CA59CD1FDCA28C5BE6373BD01D949EEE1BA51AA7A8
                                                                                      SHA-512:ADDBCA6E296286220FFF449D3E34E5267528627AFFF1FCBD2B9AC050A068D116452D70308049D88208FB7CB2C2F7582FCF1703CF22CFC125F2E6FA89B8A653FE
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-10, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1095
                                                                                      Entropy (8bit):3.267798724121087
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:olTUmJvRju3ShVbsZiAMiZyb7P4UP1w4LaxUVG4dT:olgmOEVIwAMiw/PT+4VfT
                                                                                      MD5:BF3993877A45AC7091CFC81CFD4A4D43
                                                                                      SHA1:D462934A074EE13F2C810463FD061084953F77BC
                                                                                      SHA-256:33C6072A006BA4E9513D7B7FD3D08B1C745CA1079B6D796C36B2A5AE8E4AE02B
                                                                                      SHA-512:17489E6AD6A898628239EA1B43B4BE81ECC33608F0FD3F7F0E19CF74F7FC4752813C3C21F1DC73E9CC8765E23C63ED932799905381431DAF4E10A88EC29EBF6E
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-13, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1095
                                                                                      Entropy (8bit):3.296489289648924
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:vTUmJvRju3ShVbsZiAMiZyb7P4UPt6C5AkE7MH+tZS4Y:vgmOEVIwAMiw/PTAQAkCzsP
                                                                                      MD5:3BE4986264587BEC738CC46EBB43D698
                                                                                      SHA1:62C253AA7A868CE32589868FAB37336542457A96
                                                                                      SHA-256:8D737283289BAF8C08EF1DD7E47A6C775DACE480419C5E2A92D6C0E85BB5B381
                                                                                      SHA-512:CB9079265E47EF9672EAACFCE474E4D6771C6F61394F29CC59C9BBE7C99AE89A0EACD73F2BCDD8374C4E03BE9B1685F463F029E35C4070DF9D1B143B02CAD573
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-14, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1095
                                                                                      Entropy (8bit):3.1878838020538374
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:mTUmJvRju3ShVbsZiAMiZyb7P4UPvRarkbnMH+tjg:mgmOEVIwAMiw/PTvqk7zE
                                                                                      MD5:6AE49F4E916B02EB7EDB160F88B5A27F
                                                                                      SHA1:49F7A42889FB8A0D78C80067BDE18094DBE956EE
                                                                                      SHA-256:C7B0377F30E42048492E4710FE5A0A54FA9865395B8A6748F7DAC53B901284F9
                                                                                      SHA-512:397E636F4B95522FD3909B4546A1B7E31E92388DAE4F9F6B638875449E3498B49320F4C4A47168C7ADD43C78EF5680CAAEE40661DDC8205687532D994133EA3B
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-15, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1095
                                                                                      Entropy (8bit):3.2349228762697972
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:dTUmJvRju3ShVbsZiAMiZyb7P4UP/SlTPkyTtZVc:dgmOEVIwAMiw/PTqFPkypXc
                                                                                      MD5:D30094CAEFA5C4A332159829C6CB7FEC
                                                                                      SHA1:50FDA6C70A133CB64CF38AA4B2F313B54D2FD955
                                                                                      SHA-256:C40CA014B88F97AE62AE1A816C5963B1ED432A77D84D89C3A764BA15C8A23708
                                                                                      SHA-512:6EDD6912053D810D1E2B0698494D26E119EF1BF3FABC2FBFBA44551792800FA0CF163773E4F37F908C2DE41F05D6F17153656623A6D4681BE74EB253D9163422
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-16, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.00A001040105014120AC201E016000A7016100A9021800AB017900AD017A017B.00B000B1010C0142017D201D00B600B7017E010D021900BB015201530178017C.00C000C100C2010200C4010600C600C700C800C900CA00CB00CC00CD00CE00CF.0110014300D200D300D4015000D6015A017000D900DA00DB00DC0118021A00DF.00E000E100E2010300E4010700E600E700E
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1094
                                                                                      Entropy (8bit):3.269412550127009
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:UTUmJvRju3ShVbsZiAMiZyb7P4UPPssm0O4yT2H:UgmOEVIwAMiw/PTPss5tyT2H
                                                                                      MD5:69FCA2E8F0FD9B39CDD908348BD2985E
                                                                                      SHA1:FF62EB5710FDE11074A87DAEE9229BCF7F66D7A0
                                                                                      SHA-256:0E0732480338A229CC3AD4CDDE09021A0A81902DC6EDFB5F12203E2AFF44668F
                                                                                      SHA-512:46A7899D17810D2E0FF812078D91F29BF2BB8770F09A02367CF8361229F424FC9B06EAC8E3756491612972917463B6F27DB3D897AFAE8DB5F159D45975D9CBD8
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-2, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1094
                                                                                      Entropy (8bit):3.178020305301999
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:tTUmJvRju3ShVbsZiAMiZyb7P4UPp2g4kBTvSMkFtP0:tgmOEVIwAMiw/PTj4kBTvSDP0
                                                                                      MD5:5685992A24D85E93BD8EA62755E327BA
                                                                                      SHA1:B0BEBEDEC53FFB894D9FB0D57F25AB2A459B6DD5
                                                                                      SHA-256:73342C27CF55F625D3DB90C5FC8E7340FFDF85A51872DBFB1D0A8CB1E43EC5DA
                                                                                      SHA-512:E88ED02435026CA9B8A23073F61031F3A75C4B2CD8D2FC2B598F924ADF34B268AB16909120F1D96B794BDBC484C764FDE83B63C9FB122279AC5242D57030AF3A
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-3, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1094
                                                                                      Entropy (8bit):3.2703067063488724
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:KTUmJvRju3ShVbsZiAMiZyb7P4UP04xsD/njwKyjhJ:KgmOEVIwAMiw/PT06s3fylJ
                                                                                      MD5:07576E85AFDB2816BBCFFF80E2A12747
                                                                                      SHA1:CC1C2E6C35B005C17EB7B1A3D744983A86A75736
                                                                                      SHA-256:17745BDD299779E91D41DB0CEE26CDC7132DA3666907A94210B591CED5A55ADB
                                                                                      SHA-512:309EEF25EE991E3321A57D2CEE139C9C3E7C8B3D9408664AAFE9BA34E28EF5FB8167481F3C5CAD0557AE55249E47016CA3A6AC19857D76EFB58D0CDAC428F600
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-4, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1094
                                                                                      Entropy (8bit):3.2716690950473573
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:zTUmJvRju3ShVbsZiAMiZyb7P4UPNXe+SAJlM9aHe3cmy+:zgmOEVIwAMiw/PTNp5+smy+
                                                                                      MD5:67577E6720013EEF73923D3F050FBFA1
                                                                                      SHA1:F9F64BB6014068E2C0737186C694B8101DD9575E
                                                                                      SHA-256:BC5ED164D15321404BBDCAD0D647C322FFAB1659462182DBD3945439D9ECBAE7
                                                                                      SHA-512:B584DB1BD5BE97CCFCA2F71E765DEC66CF2ABE18356C911894C988B2238E14074748C71074E0633C7CA50733E189D937160A35438C720DB2243CBC3566F52629
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-5, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.00A0040104020403040404050406040704080409040A040B040C00AD040E040F.0410041104120413041404150416041704180419041A041B041C041D041E041F.0420042104220423042404250426042704280429042A042B042C042D042E042F.0430043104320433043404350436043704380439043A043B043C043D043E043F.044004410442044304440445044604470448
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1094
                                                                                      Entropy (8bit):2.9147595181616284
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:YTUmJvRju3ShVbsZiAMiZyb7P4UPSIZjyco/rs:YgmOEVIwAMiw/PTBsBrs
                                                                                      MD5:49DEC951C7A7041314DF23FE26C9B300
                                                                                      SHA1:B810426354D857718CC841D424DA070EFB9F144F
                                                                                      SHA-256:F502E07AE3F19CCDC31E434049CFC733DD5DF85487C0160B0331E40241AD0274
                                                                                      SHA-512:CB5D8C5E807A72F35AD4E7DA80882F348D70052169A7ED5BB585152C2BF628177A2138BD0A982A398A8DF373E1D3E145AD1F6C52485DE57ECBE5A7ED33E13776
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-6, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1094
                                                                                      Entropy (8bit):3.2933089629252037
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:TMyTUmJvRju3ShVbsZiAMiZyb7P4UP1mKUQQSqJWeIDmq:TlgmOEVIwAMiw/PTkKJQSqJWeI1
                                                                                      MD5:0AF65F8F07F623FA38E2D732400D95CF
                                                                                      SHA1:D2903B32FEA225F3FB9239E622390A078C8A8FA6
                                                                                      SHA-256:8FEC7631A69FCF018569EBADB05771D892678790A08E63C05E0007C9910D58A8
                                                                                      SHA-512:EF03237A030C54E0E20DBA7ED724580C513490B9B3B043C1E885638E7BCE21415CE56C3902EA39689365B12E44194C6BF868C4D9BCBCA8FDC334BE77DA46E24D
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-7, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.00A02018201900A30000000000A600A700A800A9000000AB00AC00AD00002015.00B000B100B200B303840385038600B703880389038A00BB038C00BD038E038F.0390039103920393039403950396039703980399039A039B039C039D039E039F.03A003A1000003A303A403A503A603A703A803A903AA03AB03AC03AD03AE03AF.03B003B103B203B303B403B503B603B703B8
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1094
                                                                                      Entropy (8bit):2.9730608214144323
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:uTUmJvRju3ShVbsZiAMiZyb7P4UPtePly0b:ugmOEVIwAMiw/PTtw
                                                                                      MD5:45E35EFF7ED2B2DF0B5694A2B639FE1E
                                                                                      SHA1:4EA5EC5331541EDE65A9CF601F5418FD4B6CFCBC
                                                                                      SHA-256:E1D207917AA3483D9110E24A0CC0CD1E0E5843C8BFC901CFEE7A6D872DD945A9
                                                                                      SHA-512:527283C9EFF2C1B21FAE716F5DFB938D8294B22938C76A73D88135312FA01B5C3DF288461CCE8B692928B334A28A7D29319F9F48733174C898F41BD1BEB8E862
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-8, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1094
                                                                                      Entropy (8bit):3.1865263857127375
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:XTUmJvRju3ShVbsZiAMiZyb7P4UPvvPNNAkKMH+tZL/M:XgmOEVIwAMiw/PTvokKzR0
                                                                                      MD5:675C89ECD212C8524B1875095D78A5AF
                                                                                      SHA1:F585C70A5589DE39558DAC016743FF85E0C5F032
                                                                                      SHA-256:1CDCF510C38464E5284EDCFAEC334E3FC516236C1CA3B9AB91CA878C23866914
                                                                                      SHA-512:E620657C5F521A101B6FF7B5FD9A7F0DDD560166BA109D20E91F2E828F81697F897DFA136533C0D6F24A9861E92F34C0CC0FA590F344713C089157F8AC3ECFE2
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: iso8859-9, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.00A000A100A200A300A400A500A600A700A800A900AA00AB00AC00AD00AE00AF.00B000B100B200B300B400B500B600B700B800B900BA00BB00BC00BD00BE00BF.00C000C100C200C300C400C500C600C700C800C900CA00CB00CC00CD00CE00CF.011E00D100D200D300D400D500D600D700D800D900DA00DB00DC0130015E00DF.00E000E100E200E300E400E500E600E700E8
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1092
                                                                                      Entropy (8bit):3.1984111069807395
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:zBTUmJvRju3ShVbsZiAMiZyb7PN8pUPnfk5JM0RHFj:zBgmOEVIwAMiw/PNPQPFj
                                                                                      MD5:0DCB64ACBB4B518CC20F4E196E04692C
                                                                                      SHA1:7AEB708C89C178FB4D5611C245EA1A7CF66ADF3A
                                                                                      SHA-256:480F61D0E1A75DEE59BF9A66DE0BB78FAAE4E87FD6317F93480412123277D442
                                                                                      SHA-512:4AFA210763DE9742626886D7D281AC15169CDC7A31D185F48D105190CA247AA014FB8F281AFCB4A0C31D2D55EE7D907B6A8E51FC4BEEDB9DB8C484E88CAA78A9
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: jis0201, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D203E007F.0080008100820083008400850086008700880089008A008B008C008D008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.0000FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F.FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F.FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F.FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F.00000000000000000000000000000000000000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):80453
                                                                                      Entropy (8bit):2.274731552146978
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:R7Cyeug/RAEo7umlshyGYknyRXglMVw9bq7bYI45zh2cvA3FXwhZ1BrUc2C5oS5u:RgZJo7uNhbyO1ZiEXPcXwhZbrUPkBso2
                                                                                      MD5:F35938AC582E460A14646D2C93F1A725
                                                                                      SHA1:A922ACACE0C1A4A7DDC92FE5DD7A116D30A3686B
                                                                                      SHA-256:118EA160EF29E11B46DEC57AF2C44405934DD8A7C49D2BC8B90C94E8BAA6138B
                                                                                      SHA-512:D27CD9C9D67370C288036AACA5999314231F7070152FF7EEF1F3379E748EF9047001430D391B61C281FF69AB4F709D47F8FF5390873B5DEFD105371AB8FB8872
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: jis0208, double-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):70974
                                                                                      Entropy (8bit):2.2631380488363284
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:WmU4+qNPpEzjKgGWJACVeCssX2Qt5E2+G7PBIv:LU4+qNaCgGW7VGK2o+0qv
                                                                                      MD5:F518436AC485F5DC723518D7872038E0
                                                                                      SHA1:15013478760463A0BCE3577B4D646ECDB07632B5
                                                                                      SHA-256:24A9D379FDA39F2BCC0580CA3E0BD2E99AE279AF5E2841C9E7DBE7F931D19CC0
                                                                                      SHA-512:2325705D4772A10CD81082A035BEAC85E6C64C7CCFA5981955F0B85CAF9A95D8A0820092957822A05C2E8E773F2089035ED5E76BF3FAF19B0E7E6AED7B4214D8
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: jis0212, double-byte.D.2244 0 68.22.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.00000000000000000000000000000000000000000000000000000000000002D8.02C700B802D902DD00AF02DB02DA007E03840385000000000000000000000000.0000000000A100A600BF00000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000BA00AA00A900AE2122.00A4211600000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.463428231669408
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:KcJ5mTUmJvRju3ShVbsZiAMiZyb7PcSzm1XvRS3YcmchJQ3MAxSy:KmmgmOEVIwAMiw/Ptz8gBmRcAx5
                                                                                      MD5:E66D42CB71669CA0FFBCDC75F6292832
                                                                                      SHA1:366C137C02E069B1A93FBB5D64B9120EA6E9AD1F
                                                                                      SHA-256:7142B1120B993D6091197574090FE04BE3EA64FFC3AD5A167A4B5E0B42C9F062
                                                                                      SHA-512:6FBF7AF0302B4AA7EF925EFED7235E946EDA8B628AA204A8BBB0A3D1CB8C79DD37D9DD92A276AD14B55776FEBB3B55CF5881AC4013F95ED4E618E3B49771E8A5
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: koi8-r, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.439504497428066
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:K+TUmJvRju3ShVbsZiAMiZyb7PcSzmn3gXDRS3YcmchJQ3MAxSy:K+gmOEVIwAMiw/Ptz0KgBmRcAx5
                                                                                      MD5:D722EFEA128BE671A8FDA45ED7ADC586
                                                                                      SHA1:DA9E67F64EC4F6A74C60CB650D5A12C4430DCFF7
                                                                                      SHA-256:BBB729B906F5FC3B7EE6694B208B206D19A9D4DC571E235B9C94DCDD4A323A2A
                                                                                      SHA-512:FDF183C1A0D9109E21F7EEBC5996318AEDED3F87319A980C4E96BFE1D43593BDB693D181744C5C7E391A849783E3594234060A9F76116DE56F9592EF95979E63
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: koi8-u, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):92877
                                                                                      Entropy (8bit):2.32911747373862
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:XtWS2ymX62EztZ1Oyxk1uGtQPUNg0q+6XVfEFh:XtWnzEn1HxRQQPV0Eeh
                                                                                      MD5:599CEA614F5C5D01CDFA433B184AA904
                                                                                      SHA1:C2FFA427457B4931E5A92326F251CD3D671059B0
                                                                                      SHA-256:0F8B530AD0DECBF8DD81DA8291B8B0F976C643B5A292DB84680B31ECFBE5D00A
                                                                                      SHA-512:43D24B719843A21E3E1EDDFC3607B1B198542306C2EC8D621188CD39BA913D23678D39D12D8370CC1CE12828661AF0A5F14AD2B2BF99F62387C5E3E365BA1E75
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: ksc5601, double-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1096
                                                                                      Entropy (8bit):3.3601842107710365
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8jTUmJvRju3ShVbsZiAMiZyb7P4ZVPJS82WcVDX1MPEd4RPMppJ8K:8jgmOEVIwAMiw/PsVoy24VMppiK
                                                                                      MD5:CADFBF5A4C7CAD984294284D643E9CA3
                                                                                      SHA1:16B51D017001688A32CB7B15DE6E7A49F28B76FD
                                                                                      SHA-256:8F3089F4B2CA47B7AC4CB78375B2BFAC01268113A7C67D020F8B5B7F2C25BBDA
                                                                                      SHA-512:3941ACA62CF59BF6857BA9C300B4236F18690DE1213BB7FCFA0EC87DCD71152849F1DEAFB470CA4BC2ACC2C0C13D7FD57661BFC053960ADD7570DE365AE7E63C
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macCentEuro, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1096
                                                                                      Entropy (8bit):3.3293096097500965
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8ULyTUmJvRju3ShVbsZiAMiZyb7P4SNMdNxOZwl+KR8DklJyseQWkv:8ULygmOEVIwAMiw/P34+KR8DklEswm
                                                                                      MD5:F13D479550D4967A0BC76A60C89F1461
                                                                                      SHA1:63F44E818284384DE07AB0D8B0CD6F7EBFE09AB9
                                                                                      SHA-256:8D0B6A882B742C5CCE938241328606C111DDA0CB83334EBEDCDA17605F3641AE
                                                                                      SHA-512:80AB9DCAAC1A496FD2CA6BE9959FE2DE201F504D8A58D114F2FF5D1F6AAD507F052B87D29D3EBA69093C3D965CC4C113C9EA6DB8EEBB67BD620ADF860CA2CC35
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macCroatian, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1096
                                                                                      Entropy (8bit):3.3482225358368565
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8dTUmJvRju3ShVbsZiAMiZyb7P4GE+SAJlM9aDpiR/Pk956e3cmh:8dgmOEVIwAMiw/Pr5NY3k9nsmh
                                                                                      MD5:60FFC8E390A31157D8646AEAC54E58AE
                                                                                      SHA1:3DE17B2A5866272602FB8E9C54930A4CD1F3B06C
                                                                                      SHA-256:EB135A89519F2E004282DED21B11C3AF7CCB2320C9772F2DF7D1A4A1B674E491
                                                                                      SHA-512:3644429A9BD42ADC356E1BD6FCFABEE120E851348B538A4FE4903B72A533174D7448A6C2DA71219E4CD5D0443C0475417D54C8E113005DF2CA20C608DE5E3306
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macCyrillic, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1096
                                                                                      Entropy (8bit):3.8086748658227827
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:87JM0UmJvRjuyfqYCsUBOdXBCbtwHviANskNWkiXFtoE4OSFgHrBPkq:87KfmOEqYCs6CXRPiANHWkiXFt9XSMdf
                                                                                      MD5:EBD121A4E93488A48FC0A06ADE9FD158
                                                                                      SHA1:A40E6DB97D6DB2893A072B2275DC22E2A4D60737
                                                                                      SHA-256:8FBCC63CB289AFAAE15B438752C1746F413F3B79BA5845C2EF52BA1104F8BDA6
                                                                                      SHA-512:26879ABE4854908296F32B2BB97AEC1F693C56EC29A7DB9B63B2DA62282F2D2EDAE9D50738595D1530731DF5B1812719A74F50ADF521F80DD5067F3DF6A3517C
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macDingbats, single-byte.S.003F 1 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.00202701270227032704260E2706270727082709261B261E270C270D270E270F.2710271127122713271427152716271727182719271A271B271C271D271E271F.2720272127222723272427252726272726052729272A272B272C272D272E272F.2730273127322733273427352736273727382739273A273B273C273D273E273F.2740274127422743274427452746274727482749274A274B25CF274D25A0274F.27502751275225B225BC25C6275625D727582759275A275B275C275D275E007F.F8D7F8D8F8D9F8DAF8DBF8DCF8DDF8DEF8DFF8E0F8E1F8E2F8E3F8E4008E008F.0090009100920093009400950096009700980099009A009B009C009D009E009F.0000276127622763276427652766276726632666266526602460246124622463.2464246524662467246824692776277727782779277A277B277C277D277E277F.2780278127822783278427852786278727882789278A278B278C278D278E278F.2790279127922793279421922194219527982799279A279B279C279D279E279F.27A027A127A227A327A427A527A627A727
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1093
                                                                                      Entropy (8bit):3.4271472017271556
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8dOTUmJvRju3ShVbsZiAMiZyb7P4Hlb7BMM2aSYjsSkUEkp1FsOSUTime:8kgmOEVIwAMiw/Pg7K23s0x1FsOJTime
                                                                                      MD5:14AD68855168E3E741FE179888EA7482
                                                                                      SHA1:9C2AD53D69F5077853A05F0933330B5D6F88A51C
                                                                                      SHA-256:F7BFF98228DED981EC9A4D1D0DA62247A8D23F158926E3ACBEC3CCE379C998C2
                                                                                      SHA-512:FB13F32197D3582BC20EEA604A0B0FD7923AE541CCEB3AF1CDE36B0404B8DB6312FB5270B40CBC8BA4C91B9505B57FB357EB875E8AFB3DB76DFB498CE17851ED
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macGreek, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1095
                                                                                      Entropy (8bit):3.3292041026777457
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8KTUmJvRju3ShVbsZiAMiZyb7P4SNMVtOZm5YRMdjY4g4JysAWD:8KgmOEVIwAMiw/Pf2YRMFBEszD
                                                                                      MD5:6D52A84C06970CD3B2B7D8D1B4185CE6
                                                                                      SHA1:C434257D76A9FDF81CCCD8CC14242C8E3940FD89
                                                                                      SHA-256:633F5E3E75BF1590C94AB9CBF3538D0F0A7A319DB9016993908452D903D9C4FD
                                                                                      SHA-512:711F4DC86DD609823BF1BC5505DEE9FA3875A8AA7BCA31DC1B5277720C5ABE65B62E8A592FC55D99D1C7CA181FDDC2606551C43A9D12489B9FECFF152E9A3DCF
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macIceland, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):48028
                                                                                      Entropy (8bit):3.3111639331656635
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:ehuW1PJnT9TO7RaQiPCLUKr7KBi9FrOLdtHJ:eZPV9KuqTxFGXp
                                                                                      MD5:105B49F855C77AE0D3DED6C7130F93C2
                                                                                      SHA1:BA187C52FAE9792DA5BFFBEAA781FD4E0716E0F6
                                                                                      SHA-256:2A6856298EC629A16BDD924711DFE3F3B1E3A882DDF04B7310785D83EC0D566C
                                                                                      SHA-512:5B5FBE69D3B67AF863759D92D4A68481EC2211FF84ED9F0B3BD6129857966DE32B42A42432C44B9246C9D0D9C4C546CD3C6D13FF49BD338192C24AD053C0602E
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macJapan, multi-byte.M.003F 0 46.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.0080000000000000000000000000000000000000000000000000000000000000.0000000000000000000000000000000000000000000000000000000000000000.00A0FF61FF62FF63FF64FF65FF66FF67FF68FF69FF6AFF6BFF6CFF6DFF6EFF6F.FF70FF71FF72FF73FF74FF75FF76FF77FF78FF79FF7AFF7BFF7CFF7DFF7EFF7F.FF80FF81FF82FF83FF84FF85FF86FF87FF88FF89FF8AFF8BFF8CFF8DFF8EFF8F.FF90FF91FF92FF93FF94FF95FF96FF97FF98FF99FF9AFF9BFF9CFF9DFF9EFF9F.0000000000000000000000000000000000000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1093
                                                                                      Entropy (8bit):3.3361385497578406
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8TTUmJvRju3ShVbsZiAMiZyb7P4SNMVtOZm5YRMdjBtRg4JysAWD:8TgmOEVIwAMiw/P32YRMTtRBEszD
                                                                                      MD5:30BECAE9EFD678B6FD1E08FB952A7DBE
                                                                                      SHA1:E4D8EA6A0E70BB793304CA21EB1337A7A2C26A31
                                                                                      SHA-256:68F22BAD30DAA81B215925416C1CC83360B3BB87EFC342058929731AC678FF37
                                                                                      SHA-512:E87105F7A5A983ACEAC55E93FA802C985B2B19F51CB3C222B4C13DDCF17C32D08DF323C829FB4CA33770B668485B7D14B7F6B0CF2287B0D76091DE2A675E88BD
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macRoman, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1095
                                                                                      Entropy (8bit):3.342586490827578
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8tTUmJvRju3ShVbsZiAMiZyb7P4SNMVZSxOZFYRMdj/TAg4JysAWD:8tgmOEVIwAMiw/P3AtYRMFTABEszD
                                                                                      MD5:C9AD5E42DA1D2C872223A14CC76F1D2B
                                                                                      SHA1:E257BD16EF34FDC29D5B6C985A1B45801937354C
                                                                                      SHA-256:71AE80ADFB437B7BC88F3C76FD37074449B3526E7AA5776D2B9FD5A43C066FA8
                                                                                      SHA-512:74588523D35A562AD4B1AF2B570596194D8C5018D5B44C8BA2B1F6BAD422D06E90172B0E65BB975663F3A3C246BCF2F598E9778BA86D1C5A51F5C0A38A2670EC
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macRomania, single-byte.S.003F 0 1.00.0000000100020003000400050006000700080009000A000B000C000D000E000F.0010001100120013001400150016001700180019001A001B001C001D001E001F.0020002100220023002400250026002700280029002A002B002C002D002E002F.0030003100320033003400350036003700380039003A003B003C003D003E003F.0040004100420043004400450046004700480049004A004B004C004D004E004F.0050005100520053005400550056005700580059005A005B005C005D005E005F.0060006100620063006400650066006700680069006A006B006C006D006E006F.0070007100720073007400750076007700780079007A007B007C007D007E007F.00C400C500C700C900D100D600DC00E100E000E200E400E300E500E700E900E8.00EA00EB00ED00EC00EE00EF00F100F300F200F400F600F500FA00F900FB00FC.202000B000A200A300A7202200B600DF00AE00A9212200B400A822600102015E.221E00B12264226500A500B522022211220F03C0222B00AA00BA21260103015F.00BF00A100AC221A01922248220600AB00BB202600A000C000C300D501520153.20132014201C201D2018201900F725CA00FF0178204400A42039203A01620163.202100B7201A201E203000C200CA00C100C
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1092
                                                                                      Entropy (8bit):3.539905812302991
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:88TUmJvRju3ShVbsZiAMiZyb7P4oJi8XPHmED43U/Tmh:88gmOEVIwAMiw/PNJpP43U0
                                                                                      MD5:163729C7C2B1F5A5DE1FB7866C93B102
                                                                                      SHA1:633D190B5E281CFC0178F6C11DD721C6A266F643
                                                                                      SHA-256:CEAD5EB2B0B44EF4003FBCB2E49CA0503992BA1D6540D11ACBBB84FDBBD6E79A
                                                                                      SHA-512:2093E3B59622E61F29276886911FAA50BA3AA9D903CAF8CB778A1D3FDB3D1F7DA43071AFC3672C27BE175E7EEBBC542B655A85533F41EA39F32E80663CAF3B44
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macThai, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1095
                                                                                      Entropy (8bit):3.353168947106635
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8QjTUmJvRju3ShVbsZiAMiZyb7P4SNMVtOZm5YRMdD/g4JysD:88gmOEVIwAMiw/P32YRM9BEsD
                                                                                      MD5:F20CBBE1FF9289AC4CBAFA136A9D3FF1
                                                                                      SHA1:382E34824AD8B79EF0C98FD516750649FD94B20A
                                                                                      SHA-256:F703B7F74CC6F5FAA959F51C757C94623677E27013BCAE23BEFBA01A392646D9
                                                                                      SHA-512:23733B711614EA99D954E92C6035DAC1237866107FE11CDD5B0CD2A780F22B9B7B879570DB38C6B9195F54DAD9DFB0D60641AB37DFF3C51CF1A11D1D36471B2D
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macTurkish, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1095
                                                                                      Entropy (8bit):3.3460856516901947
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:8TzTUmJvRju3ShVbsZiAMiZyb7P4GE+SAJlM9aDpiR/Pk956e3cmq:8PgmOEVIwAMiw/Pr5NY3k9nsmq
                                                                                      MD5:92716A59D631BA3A352DE0872A5CF351
                                                                                      SHA1:A487946CB2EFD75FD748503D75E495720B53E5BC
                                                                                      SHA-256:4C94E7FBE183379805056D960AB624D78879E43278262E4D6B98AB78E5FEFEA8
                                                                                      SHA-512:863A667B6404ED02FE994089320EB0ECC34DC431D591D661277FB54A2055334DBEBCAAE1CA06FB8D190727EBA23A47B47991323BE35E74C182F83E5DEAA0D83B
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: macUkraine, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):41862
                                                                                      Entropy (8bit):3.4936148161949747
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:/huW1PJnT9TOZRaQiPCLUKr7KBi9FrOLdtY:/ZPV9KoqTxFGXY
                                                                                      MD5:8FBCB1BBC4B59D6854A8FCBF25853E0D
                                                                                      SHA1:2D56965B24125D999D1020C7C347B813A972647C
                                                                                      SHA-256:7502587D52E7810228F2ECB45AC4319EA0F5C008B7AC91053B920010DC6DDF94
                                                                                      SHA-512:128E66F384F9EA8F3E7FBEAD0D3AA1D45570EB3669172269A89AE3B522ED44E4572C6A5C9281B7E219579041D14FF0E76777A36E3902BFA1B58DC3DA729FA075
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: shiftjis, multi-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.675943323650254
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:Sd0UmJvRjuLoVoMQVoRmSdsTAsSnP9Us+yw4VivXObCXv:afmOEVoMQVoRmosTHSP9U/ydmXwCXv
                                                                                      MD5:1B612907F31C11858983AF8C009976D6
                                                                                      SHA1:F0C014B6D67FC0DC1D1BBC5F052F0C8B1C63D8BF
                                                                                      SHA-256:73FD2B5E14309D8C036D334F137B9EDF1F7B32DBD45491CF93184818582D0671
                                                                                      SHA-512:82D4A8F9C63F50E5D77DAD979D3A59729CD2A504E7159AE3A908B7D66DC02090DABD79B6A6DC7B998C32C383F804AACABC564A5617085E02204ADF0B13B13E5B
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: symbol, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):2.9763240350841884
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:ZlTUmJvRju3ShVbsZiAMiZyb7PNHmED43U/TW5dF:PgmOEVIwAMiw/PJ43UKF
                                                                                      MD5:7273E998972C9EFB2CEB2D5CD553DE49
                                                                                      SHA1:4AA47E6DF964366FA3C29A0313C0DAE0FA63A78F
                                                                                      SHA-256:330517F72738834ECBF4B6FA579F725B4B33AD9F4669975E727B40DF185751FF
                                                                                      SHA-512:56BF15C123083D3F04FE0C506EE8ECE4C08C17754F0CAAD3566F1469728CFD2F0A487023DCB26432240EB09F064944D3EF08175979F5D1D2BF734E7C7C609055
                                                                                      Malicious:false
                                                                                      Preview:# Encoding file: tis-620, single-byte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
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7900
                                                                                      Entropy (8bit):4.806010360595623
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:DXzSaH9ox7j4LaQMpsyGb0XEACrHpff6Jy8qNy6QRIt5QYTLa3QAQYplavQqQIL0:DpH9m7DPnQdg+Q
                                                                                      MD5:E8FD468CCD2EE620544FE204BDE2A59D
                                                                                      SHA1:2E26B7977D900EAA7D4908D5113803DF6F34FC59
                                                                                      SHA-256:9B6E400EB85440EC64AB66B4AC111546585740C9CA61FD156400D7153CBAD9F4
                                                                                      SHA-512:13A40A4BDE32F163CB789C69BD260ABF41C6771E7AC50FB122C727B9F39BE5D73E4D8BAE040DDDD94C5F2B901AB7C32D9C6BB62310121CA8DB4ADE25CB9AA4B0
                                                                                      Malicious:false
                                                                                      Preview:# history.tcl --.#.# Implementation of the history command..#.# Copyright (c) 1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES..#...# The tcl::history array holds the history list and some additional.# bookkeeping variables..#.# nextid.the index used for the next history list item..# keep..the max size of the history list.# oldest.the index of the oldest item in the history...namespace eval ::tcl {. variable history. if {![info exists history]} {..array set history {.. nextid.0.. keep.20.. oldest.-20..}. }.. namespace ensemble create -command ::tcl::history -map {..add.::tcl::HistAdd..change.::tcl::HistChange..clear.::tcl::HistClear..event.::tcl::HistEvent..info.::tcl::HistInfo..keep.::tcl::HistKeep..nextid.::tcl::HistNextID..redo.::tcl::HistRedo. }.}...# history --.#.#.This is the main history command. See the man page for its interface..#.This does s
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9689
                                                                                      Entropy (8bit):4.754346192989986
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:kQkH8VqqNg5PPx7GRpoMJesrCL2coOG0vARQVSDR6VrKj7vWQYQN81QvLbDdv:pVqeglpu6toO3ACUnvv
                                                                                      MD5:1DA12C32E7E4C040BD9AB2BCBAC5445B
                                                                                      SHA1:8E8659BEF065AF9430509BBDD5FB4CFE0EF14153
                                                                                      SHA-256:ACBFF9B5EF75790920B95023156FAD80B18AFF8CAFC4A6DC03893F9388E053A2
                                                                                      SHA-512:A269C76C1684EC1A2E2AA611ABB459AA3BE2973FD456737BC8C8D2E5C8BC53A26BBC1488062281CA87E38D548281166C4D775C50C695AEC9741FE911BB431EAD
                                                                                      Malicious:false
                                                                                      Preview:# http.tcl.# Client-side HTTP for GET, POST, and HEAD commands..# These routines can be used in untrusted code that uses the Safesock.# security policy..# These procedures use a callback interface to avoid using vwait,.# which is not defined in the safe base..#.# See the http.n man page for documentation..package provide http 1.0..array set http {. -accept */*. -proxyhost {}. -proxyport {}. -useragent {Tcl http client package 1.0}. -proxyfilter httpProxyRequired.}.proc http_config {args} {. global http. set options [lsort [array names http -*]]. set usage [join $options ", "]. if {[llength $args] == 0} {..set result {}..foreach name $options {.. lappend result $name $http($name)..}..return $result. }. regsub -all -- - $options {} options. set pat ^-([join $options |])$. if {[llength $args] == 1} {..set flag [lindex $args 0]..if {[regexp -- $pat $flag]} {.. return $http($flag)..} else {.. return -code error "Unknown option $flag, must be:
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):735
                                                                                      Entropy (8bit):4.669068874824871
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:jHxxYRs+opS42wyGlTajUA43KXks4L57+HkuRz20JSv6C3l5kl:bbYRshS42wyGlTah9XkbL5i1z2jxXkl
                                                                                      MD5:10EC7CD64CA949099C818646B6FAE31C
                                                                                      SHA1:6001A58A0701DFF225E2510A4AAEE6489A537657
                                                                                      SHA-256:420C4B3088C9DACD21BC348011CAC61D7CB283B9BEE78AE72EED764AB094651C
                                                                                      SHA-512:34A0ACB689E430ED2903D8A903D531A3D734CB37733EF13C5D243CB9F59C020A3856AAD98726E10AD7F4D67619A3AF1018F6C3E53A6E073E39BD31D088EFD4AF
                                                                                      Malicious:false
                                                                                      Preview:# Tcl package index file, version 1.0.# This file is generated by the "pkg_mkIndex" command.# and sourced either when an application starts up or.# by a "package unknown" script. It invokes the.# "package ifneeded" command to set up package-related.# information so that packages will be loaded automatically.# in response to "package require" commands. When this.# script is sourced, the variable $dir must contain the.# full path name of this file's directory...package ifneeded http 1.0 [list tclPkgSetup $dir http 1.0 {{http.tcl source {httpCopyDone httpCopyStart httpEof httpEvent httpFinish httpMapReply httpProxyRequired http_code http_config http_data http_formatQuery http_get http_reset http_size http_status http_wait}}}].
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):24432
                                                                                      Entropy (8bit):4.824619671192163
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:U8Oh2gWD8Ud4zaJqacMQsRNLKx32LgWMOFaBBf6/9IrO1zWq8oXbjdEfdQxAp12Q:2OD8Ud4WJqJfcMOFt/9IrOBWq8oXwQxM
                                                                                      MD5:B900811A252BE90C693E5E7AE365869D
                                                                                      SHA1:345752C46F7E8E67DADEF7F6FD514BED4B708FC5
                                                                                      SHA-256:BC492B19308BC011CFCD321F1E6E65E6239D4EEB620CC02F7E9BF89002511D4A
                                                                                      SHA-512:36B8CDBA61B9222F65B055C0C513801F3278A3851912215658BCF0CE10F80197C1F12A5CA3054D8604DA005CE08DA8DCD303B8544706B642140A49C4377DD6CE
                                                                                      Malicious:false
                                                                                      Preview:# init.tcl --.#.# Default system startup file for Tcl-based applications. Defines.# "unknown" procedure and auto-load facilities..#.# Copyright (c) 1991-1993 The Regents of the University of California..# Copyright (c) 1994-1996 Sun Microsystems, Inc..# Copyright (c) 1998-1999 Scriptics Corporation..# Copyright (c) 2004 by Kevin B. Kenny. All rights reserved..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# This test intentionally written in pre-7.5 Tcl.if {[info commands package] == ""} {. error "version mismatch: library\nscripts expect Tcl version 7.5b1 or later but the loaded version is\nonly [info patchlevel]".}.package require -exact Tcl 8.6.9..# Compute the auto path to use in this interpreter..# The values on the path come from several locations:.#.# The environment variable TCLLIBPATH.#.# tcl_library, which is the directory containing this init.tcl script..# [tclInit] (Tcl_Init()) sea
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):989
                                                                                      Entropy (8bit):4.015702624322247
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu8wcm2NkKcmtH3WhvdfjESBToOqepFHvFgdF69dixmem1OMVjeza6O6c:4azu8DtkN3bbJ75pF9gG3U2e+gc
                                                                                      MD5:3A3B4D3B137E7270105DC7B359A2E5C2
                                                                                      SHA1:2089B3948F11EF8CE4BD3D57167715ADE65875E9
                                                                                      SHA-256:2981965BD23A93A09EB5B4A334ACB15D00645D645C596A5ECADB88BFA0B6A908
                                                                                      SHA-512:044602E7228D2CB3D0A260ADFD0D3A1F7CAB7EFE5DD00C7519EAF00A395A48A46EEFDB3DE81902D420D009B137030BC98FF32AD97E9C3713F0990FE6C09887A2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset af DAYS_OF_WEEK_ABBREV [list \. "So"\. "Ma"\. "Di"\. "Wo"\. "Do"\. "Vr"\. "Sa"]. ::msgcat::mcset af DAYS_OF_WEEK_FULL [list \. "Sondag"\. "Maandag"\. "Dinsdag"\. "Woensdag"\. "Donderdag"\. "Vrydag"\. "Saterdag"]. ::msgcat::mcset af MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mar"\. "Apr"\. "Mei"\. "Jun"\. "Jul"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Des"\. ""]. ::msgcat::mcset af MONTHS_FULL [list \. "Januarie"\. "Februarie"\. "Maart"\. "April"\. "Mei"\. "Junie"\. "Julie"\. "Augustus"\. "September"\. "Oktober"\. "November"\. "Desember"\. ""]. ::msgcat::mcset af AM "VM". ::msgcat::mcset af PM "NM".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.879621059534584
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmouFygvNLouFqF3v6aZouFy9+3vR6HK:4EnLzu8YAgvNTYF3v6axAI3voq
                                                                                      MD5:27C356DF1BED4B22DFA55835115BE082
                                                                                      SHA1:677394DF81CDBAF3D3E735F4977153BB5C81B1A6
                                                                                      SHA-256:3C2F5F631ED3603EF0D5BCB31C51B2353C5C27839C806A036F3B7007AF7F3DE8
                                                                                      SHA-512:EE88348C103382F91F684A09F594177119960F87E58C5E4FC718C698AD436E332B74B8ED18DF8563F736515A3A6442C608EBCBE6D1BD13B3E3664E1AA3851076
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset af_ZA DATE_FORMAT "%d %B %Y". ::msgcat::mcset af_ZA TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset af_ZA DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1964
                                                                                      Entropy (8bit):4.417722751563065
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8fnkFewadQxvbkMPm/FiUoAwonC9UFsvSnvMq:46dw/L+C9cKSvF
                                                                                      MD5:0A88A6BFF15A6DABAAE48A78D01CFAF1
                                                                                      SHA1:90834BCBDA9B9317B92786EC89E20DCF1F2DBD22
                                                                                      SHA-256:BF984EC7CF619E700FE7E00381FF58ABE9BD2F4B3DD622EB2EDACCC5E6681050
                                                                                      SHA-512:85CB96321BB6FB3119D69540B9E76916F0C5F534BA01382E73F8F9A0EE67A7F1BFC39947335688F2C8F3DB9B51D969D8EA7C7104A035C0E949E8E009D4656288
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar DAYS_OF_WEEK_ABBREV [list \. "\u062d"\. "\u0646"\. "\u062b"\. "\u0631"\. "\u062e"\. "\u062c"\. "\u0633"]. ::msgcat::mcset ar DAYS_OF_WEEK_FULL [list \. "\u0627\u0644\u0623\u062d\u062f"\. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\. "\u0627\u0644\u062e\u0645\u064a\u0633"\. "\u0627\u0644\u062c\u0645\u0639\u0629"\. "\u0627\u0644\u0633\u0628\u062a"]. ::msgcat::mcset ar MONTHS_ABBREV [list \. "\u064a\u0646\u0627"\. "\u0641\u0628\u0631"\. "\u0645\u0627\u0631"\. "\u0623\u0628\u0631"\. "\u0645\u0627\u064a"\. "\u064a\u0648\u0646"\. "\u064a\u0648\u0644"\. "\u0623\u063a\u0633"\. "\u0633\u0628\u062a"\. "\u0623\u0643\u062a"\
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):259
                                                                                      Entropy (8bit):4.825452591398057
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoKNvf/NLoKU3v6xH5oKNo+3vfXM6PYv:4EnLzu8yvf/Nq3v6vF3vfc6q
                                                                                      MD5:EEB42BA91CC7EF4F89A8C1831ABE7B03
                                                                                      SHA1:74D12B4CBCDF63FDF00E589D8A604A5C52C393EF
                                                                                      SHA-256:29A70EAC43B1F3AA189D8AE4D92658E07783965BAE417FB66EE5F69CFCB564F3
                                                                                      SHA-512:6CCB2F62986CE1CF3CE78538041A0E4AAF717496F965D73014A13E9B05093EB43185C3C14212DC052562F3F369AB6985485C8C93D1DFC60CF9B8DABEA7CDF434
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar_IN DATE_FORMAT "%A %d %B %Y". ::msgcat::mcset ar_IN TIME_FORMAT_12 "%I:%M:%S %z". ::msgcat::mcset ar_IN DATE_TIME_FORMAT "%A %d %B %Y %I:%M:%S %z %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1812
                                                                                      Entropy (8bit):4.023830561129656
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8J5Fe6k+wR+9Gb+Oa+UcP+wR+9Gb+Oa+UD:46I6CNbtdNbQ
                                                                                      MD5:4338BD4F064A6CDC5BFED2D90B55D4E8
                                                                                      SHA1:709717BB1F62A71E94D61056A70660C6A03B48AE
                                                                                      SHA-256:78116E7E706C7D1E3E7446094709819FB39A50C2A2302F92D6A498E06ED4A31B
                                                                                      SHA-512:C63A535AD19CBEF5EFC33AC5A453B1C503A59C6CE71A4CABF8083BC516DF0F3F14D3D4F309D33EDF2EC5E79DB00ED1F7D56FD21068F09F178BB2B191603BAC25
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar_JO DAYS_OF_WEEK_ABBREV [list \. "\u0627\u0644\u0623\u062d\u062f"\. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\. "\u0627\u0644\u062e\u0645\u064a\u0633"\. "\u0627\u0644\u062c\u0645\u0639\u0629"\. "\u0627\u0644\u0633\u0628\u062a"]. ::msgcat::mcset ar_JO MONTHS_ABBREV [list \. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\. "\u0634\u0628\u0627\u0637"\. "\u0622\u0630\u0627\u0631"\. "\u0646\u064a\u0633\u0627\u0646"\. "\u0646\u0648\u0627\u0631"\. "\u062d\u0632\u064a\u0631\u0627\u0646"\. "\u062a\u0645\u0648\u0632"\. "\u0622\u0628"\. "\u0623\u064a\u0644\u0648\u0644"\. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u0644"\. "\u062a\
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1812
                                                                                      Entropy (8bit):4.020656526954981
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu865Fehk+wR+9Gb+Oa+UXP+wR+9Gb+Oa+UD:46nhCNbadNbQ
                                                                                      MD5:3789E03CF926D4F12AFD30FC7229B78D
                                                                                      SHA1:AEF38AAB736E5434295C72C14F38033AAFE6EF15
                                                                                      SHA-256:7C970EFEB55C53758143DF42CC452A3632F805487CA69DB57E37C1F478A7571B
                                                                                      SHA-512:C9172600703337EDB2E36D7470A3AED96CCC763D7163067CB19E7B097BB7877522758C3109E31D5D72F486DD50BF510DDBA50EDD248B899FA0A2EEF09FCBF903
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar_LB DAYS_OF_WEEK_ABBREV [list \. "\u0627\u0644\u0623\u062d\u062f"\. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\. "\u0627\u0644\u062e\u0645\u064a\u0633"\. "\u0627\u0644\u062c\u0645\u0639\u0629"\. "\u0627\u0644\u0633\u0628\u062a"]. ::msgcat::mcset ar_LB MONTHS_ABBREV [list \. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\. "\u0634\u0628\u0627\u0637"\. "\u0622\u0630\u0627\u0631"\. "\u0646\u064a\u0633\u0627\u0646"\. "\u0646\u0648\u0627\u0631"\. "\u062d\u0632\u064a\u0631\u0627\u0646"\. "\u062a\u0645\u0648\u0632"\. "\u0622\u0628"\. "\u0623\u064a\u0644\u0648\u0644"\. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u0644"\. "\u062a\
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1812
                                                                                      Entropy (8bit):4.02203966019266
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8k5Fezk+wR+9Gb+Oa+U5P+wRa9Gb+Oa+UD:46ZzCNb0d5bQ
                                                                                      MD5:EC736BFD4355D842E5BE217A7183D950
                                                                                      SHA1:C6B83C02F5D4B14064D937AFD8C6A92BA9AE9EFB
                                                                                      SHA-256:AEF17B94A0DB878E2F0FB49D982057C5B663289E3A8E0E2B195DCEC37E8555B1
                                                                                      SHA-512:68BB7851469C24003A9D74FC7FE3599A2E95EE3803014016DDEBF4C5785F49EDBADA69CD4103F2D3B6CE91E9A32CC432DBDFEC2AED0557E5B6B13AED489A1EDA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ar_SY DAYS_OF_WEEK_ABBREV [list \. "\u0627\u0644\u0623\u062d\u062f"\. "\u0627\u0644\u0627\u062b\u0646\u064a\u0646"\. "\u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621"\. "\u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621"\. "\u0627\u0644\u062e\u0645\u064a\u0633"\. "\u0627\u0644\u062c\u0645\u0639\u0629"\. "\u0627\u0644\u0633\u0628\u062a"]. ::msgcat::mcset ar_SY MONTHS_ABBREV [list \. "\u0643\u0627\u0646\u0648\u0646 \u0627\u0644\u062b\u0627\u0646\u064a"\. "\u0634\u0628\u0627\u0637"\. "\u0622\u0630\u0627\u0631"\. "\u0646\u064a\u0633\u0627\u0646"\. "\u0646\u0648\u0627\u0631"\. "\u062d\u0632\u064a\u0631\u0627\u0646"\. "\u062a\u0645\u0648\u0632"\. "\u0622\u0628"\. "\u0623\u064a\u0644\u0648\u0644"\. "\u062a\u0634\u0631\u064a\u0646 \u0627\u0644\u0623\u0648\u0644"\. "\u062a\
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2105
                                                                                      Entropy (8bit):4.215818273236158
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:46dJRQPQ86AK0xQuEQS3oQsDptuCrQICZmQ8ZVDtN1QFqQLtCSjZMpktvp:hdP6HIZoFnl1Rgx
                                                                                      MD5:1A3ABFBC61EF757B45FF841C197BB6C3
                                                                                      SHA1:74D623DAB6238D05C18DDE57FC956D84974FC2D4
                                                                                      SHA-256:D790E54217A4BF9A7E1DCB4F3399B5861728918E93CD3F00B63F1349BDB71C57
                                                                                      SHA-512:154D053410AA0F7817197B7EE1E8AE839BA525C7660620581F228477B1F5B972FE95A4E493BB50365D0B63B0115036DDE54A98450CA4E8048AF5D0AF092BADE5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset be DAYS_OF_WEEK_ABBREV [list \. "\u043d\u0434"\. "\u043f\u043d"\. "\u0430\u0442"\. "\u0441\u0440"\. "\u0447\u0446"\. "\u043f\u0442"\. "\u0441\u0431"]. ::msgcat::mcset be DAYS_OF_WEEK_FULL [list \. "\u043d\u044f\u0434\u0437\u0435\u043b\u044f"\. "\u043f\u0430\u043d\u044f\u0434\u0437\u0435\u043b\u0430\u043a"\. "\u0430\u045e\u0442\u043e\u0440\u0430\u043a"\. "\u0441\u0435\u0440\u0430\u0434\u0430"\. "\u0447\u0430\u0446\u0432\u0435\u0440"\. "\u043f\u044f\u0442\u043d\u0456\u0446\u0430"\. "\u0441\u0443\u0431\u043e\u0442\u0430"]. ::msgcat::mcset be MONTHS_ABBREV [list \. "\u0441\u0442\u0434"\. "\u043b\u044e\u0442"\. "\u0441\u043a\u0432"\. "\u043a\u0440\u0441"\. "\u043c\u0430\u0439"\. "\u0447\u0440\u0432"\. "\u043b\u043f\u043d"\. "\u0436\u043d\u
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1819
                                                                                      Entropy (8bit):4.363233187157474
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:46scAXuQfuQVoQAWN5EPIKfD8WQjQ3QgQaQLSqQsQGtQWCQMmt1f:hD/zQaPIKfTSiF3KVfVCqp
                                                                                      MD5:11FA3BA30A0EE6A7B2B9D67B439C240D
                                                                                      SHA1:EC5557A16A0293ABF4AA8E5FD50940B60A8A36A6
                                                                                      SHA-256:E737D8DC724AA3B9EC07165C13E8628C6A8AC1E80345E10DC77E1FC62A6D86F1
                                                                                      SHA-512:B776E7C98FB819436C61665206EE0A2644AA4952D739FF7CC58EAFBD549BD1D26028DE8E11B8533814102B31FC3884F95890971F547804BCAA4530E35BDD5CFD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset bg DAYS_OF_WEEK_ABBREV [list \. "\u041d\u0434"\. "\u041f\u043d"\. "\u0412\u0442"\. "\u0421\u0440"\. "\u0427\u0442"\. "\u041f\u0442"\. "\u0421\u0431"]. ::msgcat::mcset bg DAYS_OF_WEEK_FULL [list \. "\u041d\u0435\u0434\u0435\u043b\u044f"\. "\u041f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\. "\u0412\u0442\u043e\u0440\u043d\u0438\u043a"\. "\u0421\u0440\u044f\u0434\u0430"\. "\u0427\u0435\u0442\u0432\u044a\u0440\u0442\u044a\u043a"\. "\u041f\u0435\u0442\u044a\u043a"\. "\u0421\u044a\u0431\u043e\u0442\u0430"]. ::msgcat::mcset bg MONTHS_ABBREV [list \. "I"\. "II"\. "III"\. "IV"\. "V"\. "VI"\. "VII"\. "VIII"\. "IX"\. "X"\. "XI"\. "XII"\. ""]. ::msgcat::mcset bg MONTHS_FULL [list \. "\u042
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2286
                                                                                      Entropy (8bit):4.04505151160981
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8adWa9tUEVcqVc5VcaUTVcHVEVc+7VclEVcNGVcn0VcMG/0VcMjVcMK7YXs+:46C07LetHigetH1YES
                                                                                      MD5:B387D4A2AB661112F2ABF57CEDAA24A5
                                                                                      SHA1:80DB233687A9314600317AD39C01466C642F3C4C
                                                                                      SHA-256:297D4D7CAE6E99DB3CA6EE793519512BFF65013CF261CF90DED4D28D3D4F826F
                                                                                      SHA-512:450BB56198AAAB2EEFCD4E24C29DD79D71D2EF7E8D066F3B58F9C5D831F960AFB78C46ECE2DB32EF81454BCCC80C730E36A610DC9BAF06757E0757B421BACB19
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset bn DAYS_OF_WEEK_ABBREV [list \. "\u09b0\u09ac\u09bf"\. "\u09b8\u09cb\u09ae"\. "\u09ae\u0999\u0997\u09b2"\. "\u09ac\u09c1\u09a7"\. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf"\. "\u09b6\u09c1\u0995\u09cd\u09b0"\. "\u09b6\u09a8\u09bf"]. ::msgcat::mcset bn DAYS_OF_WEEK_FULL [list \. "\u09b0\u09ac\u09bf\u09ac\u09be\u09b0"\. "\u09b8\u09cb\u09ae\u09ac\u09be\u09b0"\. "\u09ae\u0999\u0997\u09b2\u09ac\u09be\u09b0"\. "\u09ac\u09c1\u09a7\u09ac\u09be\u09b0"\. "\u09ac\u09c3\u09b9\u09b8\u09cd\u09aa\u09a4\u09bf\u09ac\u09be\u09b0"\. "\u09b6\u09c1\u0995\u09cd\u09b0\u09ac\u09be\u09b0"\. "\u09b6\u09a8\u09bf\u09ac\u09be\u09b0"]. ::msgcat::mcset bn MONTHS_ABBREV [list \. "\u099c\u09be\u09a8\u09c1\u09df\u09be\u09b0\u09c0"\. "\u09ab\u09c7\u09ac\u09cd\u09b0\u09c1\u09df\u09be\u09b0\u09c0"\.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):259
                                                                                      Entropy (8bit):4.821338044395148
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmovtvflD/Lo/E3v6xH5ovto+3vflm6PYv:4EnLzu81tvflD/SE3v6etF3vflm6q
                                                                                      MD5:764E70363A437ECA938DEC17E615608B
                                                                                      SHA1:2296073AE8CC421780E8A3BCD58312D6FB2F5BFC
                                                                                      SHA-256:7D3A956663C529D07C8A9610414356DE717F3A2A2CE9B331B052367270ACEA94
                                                                                      SHA-512:4C7B9082DA9DDF07C2BE16C359A1A42834B8E730AD4DD5B987866C2CC735402DDE513588A89C8DFA25A1AC6F66AF9FDDBEA8FD500F8526C4641BBA7011CD0D28
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset bn_IN DATE_FORMAT "%A %d %b %Y". ::msgcat::mcset bn_IN TIME_FORMAT_12 "%I:%M:%S %z". ::msgcat::mcset bn_IN DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1102
                                                                                      Entropy (8bit):4.213250101046006
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8WBVUUQ48wsF0nuLsCtJeUFqwv1v3:46BwoL5ScfR3
                                                                                      MD5:9378A5AD135137759D46A7CC4E4270E0
                                                                                      SHA1:8D2D53DA208BB670A335C752DFC4B4FF4509A799
                                                                                      SHA-256:14FF564FAB584571E954BE20D61C2FACB096FE2B3EF369CC5ECB7C25C2D92D5A
                                                                                      SHA-512:EF784D0D982BA0B0CB37F1DA15F8AF3BE5321F59E586DBED1EDD0B3A38213D3CEA1CDFC983A025418403400CCE6039B786EE35694A5DFCE1F22CB2D315F5FCF8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ca DAYS_OF_WEEK_ABBREV [list \. "dg."\. "dl."\. "dt."\. "dc."\. "dj."\. "dv."\. "ds."]. ::msgcat::mcset ca DAYS_OF_WEEK_FULL [list \. "diumenge"\. "dilluns"\. "dimarts"\. "dimecres"\. "dijous"\. "divendres"\. "dissabte"]. ::msgcat::mcset ca MONTHS_ABBREV [list \. "gen."\. "feb."\. "mar\u00e7"\. "abr."\. "maig"\. "juny"\. "jul."\. "ag."\. "set."\. "oct."\. "nov."\. "des."\. ""]. ::msgcat::mcset ca MONTHS_FULL [list \. "gener"\. "febrer"\. "mar\u00e7"\. "abril"\. "maig"\. "juny"\. "juliol"\. "agost"\. "setembre"\. "octubre"\. "novembre"\. "desembre"\. ""]. ::msgcat::mcset ca DATE_FORMAT "%d/%m/%Y". ::msg
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1300
                                                                                      Entropy (8bit):4.400184537938628
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8f4sO4fETEtd3N5EPIK+kJQz3R3VJ2PYYITCF3eYGCvt2/v3eG:46/ETKN5EPIKfsxV+pBtMJ
                                                                                      MD5:4C5679B0880394397022A70932F02442
                                                                                      SHA1:CA5C47A76CD4506D8E11AECE1EA0B4A657176019
                                                                                      SHA-256:49CF452EEF0B8970BC56A7B8E040BA088215508228A77032CBA0035522412F86
                                                                                      SHA-512:39FA0D3235FFD3CE2BCCFFFA6A4A8EFE2668768757DAFDE901917731E20AD15FCAC4E48CF4ACF0ADFAA38CC72768FD8F1B826464B0F71A1C784E334AE72F857C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset cs DAYS_OF_WEEK_ABBREV [list \. "Ne"\. "Po"\. "\u00dat"\. "St"\. "\u010ct"\. "P\u00e1"\. "So"]. ::msgcat::mcset cs DAYS_OF_WEEK_FULL [list \. "Ned\u011ble"\. "Pond\u011bl\u00ed"\. "\u00dater\u00fd"\. "St\u0159eda"\. "\u010ctvrtek"\. "P\u00e1tek"\. "Sobota"]. ::msgcat::mcset cs MONTHS_ABBREV [list \. "I"\. "II"\. "III"\. "IV"\. "V"\. "VI"\. "VII"\. "VIII"\. "IX"\. "X"\. "XI"\. "XII"\. ""]. ::msgcat::mcset cs MONTHS_FULL [list \. "leden"\. "\u00fanor"\. "b\u0159ezen"\. "duben"\. "kv\u011bten"\. "\u010derven"\. "\u010dervenec"\. "srpen"\. "z\u00e1\u0159\u00ed"\. "\u0159\u00edjen"\. "listopad"\. "prosinec"\. ""]
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1156
                                                                                      Entropy (8bit):4.242018456508518
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8xVKE6V4/xPsS9CfXTBfijQT1GqAPwvsvT:461H6y/RsJXTNGqAuKT
                                                                                      MD5:F012F45523AA0F8CFEACC44187FF1243
                                                                                      SHA1:B171D1554244D2A6ED8DE17AC8000AA09D2FADE9
                                                                                      SHA-256:CA58FF5BAA9681D9162E094E833470077B7555BB09EEE8E8DD41881B108008A0
                                                                                      SHA-512:5BBC44471AB1B1622FABC7A12A8B8727087BE64BEAF72D2C3C9AAC1246A41D9B7CAFC5C451F24A3ACC681C310BF47BBC3384CF80EB0B4375E12646CB7BB8FFD5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset da DAYS_OF_WEEK_ABBREV [list \. "s\u00f8"\. "ma"\. "ti"\. "on"\. "to"\. "fr"\. "l\u00f8"]. ::msgcat::mcset da DAYS_OF_WEEK_FULL [list \. "s\u00f8ndag"\. "mandag"\. "tirsdag"\. "onsdag"\. "torsdag"\. "fredag"\. "l\u00f8rdag"]. ::msgcat::mcset da MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset da MONTHS_FULL [list \. "januar"\. "februar"\. "marts"\. "april"\. "maj"\. "juni"\. "juli"\. "august"\. "september"\. "oktober"\. "november"\. "december"\. ""]. ::msgcat::mcset da BCE "f.Kr.". ::msgcat::mcset da CE "e.Kr.".
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1222
                                                                                      Entropy (8bit):4.277486792653572
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8byFouxpZzWsu0biMe5pF9g1tT9egQTqrS8QWmWFUvIvWI3:46CFB/ZzWsu0vpHlrS8QLWFSeWI3
                                                                                      MD5:68882CCA0886535A613ECFE528BB81FC
                                                                                      SHA1:6ABF519F6E4845E6F13F272D628DE97F2D2CD481
                                                                                      SHA-256:CC3672969C1DD223EADD9A226E00CAC731D8245532408B75AB9A70E9EDD28673
                                                                                      SHA-512:ACD5F811A0494E04A18035D2B9171FAF3AB8C856AAB0C09AEBE755590261066ADCD2750565F1CB840B2D0111D95C98970294550A4FBD00E4346D2EDBA3A5C957
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset de DAYS_OF_WEEK_ABBREV [list \. "So"\. "Mo"\. "Di"\. "Mi"\. "Do"\. "Fr"\. "Sa"]. ::msgcat::mcset de DAYS_OF_WEEK_FULL [list \. "Sonntag"\. "Montag"\. "Dienstag"\. "Mittwoch"\. "Donnerstag"\. "Freitag"\. "Samstag"]. ::msgcat::mcset de MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mrz"\. "Apr"\. "Mai"\. "Jun"\. "Jul"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Dez"\. ""]. ::msgcat::mcset de MONTHS_FULL [list \. "Januar"\. "Februar"\. "M\u00e4rz"\. "April"\. "Mai"\. "Juni"\. "Juli"\. "August"\. "September"\. "Oktober"\. "November"\. "Dezember"\. ""]. ::msgcat::mcset de BCE "v. Chr.". ::msgcat::mcset de CE "n. Chr.".
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):812
                                                                                      Entropy (8bit):4.344116560816791
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu8U3S5dkTo7eqepFHvFgt1BAI+5zS17eM5Qz3q6owjI9I3vd3v6B3v9dy:4azu8UlMe5pF9gXDT9egQTqr+rv1vivi
                                                                                      MD5:63B8EBBA990D1DE3D83D09375E19F6AC
                                                                                      SHA1:B7714AF372B4662A0C15DDBC0F80D1249CB1EEBD
                                                                                      SHA-256:80513A9969A12A8FB01802D6FC3015712A4EFDDA64552911A1BB3EA7A098D02C
                                                                                      SHA-512:638307C9B97C74BAF38905AC88E73B57F24282E40929DA43ADB74978040B818EFCC2EE2A377DFEB3AC9050800536F2BE1C7C2A7AB9E7B8BCF8D15E5F293F24D9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset de_AT MONTHS_ABBREV [list \. "J\u00e4n"\. "Feb"\. "M\u00e4r"\. "Apr"\. "Mai"\. "Jun"\. "Jul"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Dez"\. ""]. ::msgcat::mcset de_AT MONTHS_FULL [list \. "J\u00e4nner"\. "Februar"\. "M\u00e4rz"\. "April"\. "Mai"\. "Juni"\. "Juli"\. "August"\. "September"\. "Oktober"\. "November"\. "Dezember"\. ""]. ::msgcat::mcset de_AT DATE_FORMAT "%Y-%m-%d". ::msgcat::mcset de_AT TIME_FORMAT "%T". ::msgcat::mcset de_AT TIME_FORMAT_12 "%T". ::msgcat::mcset de_AT DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1223
                                                                                      Entropy (8bit):4.319193323810203
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8I8VWRFFAVa8VpZzWsuEbkMe5pF9grtT9egQTqr9u5sevOevmDvi:46kR6VaIZzWsuEJnHlrg5soOomzi
                                                                                      MD5:A741CF1A27C77CFF2913076AC9EE9DDC
                                                                                      SHA1:DE519D3A86DCF1E8F469490967AFE350BAEAFE01
                                                                                      SHA-256:7573581DEC27E90B0C7D34057D9F4EF89727317D55F2C4E0428A47740FB1EB7A
                                                                                      SHA-512:C9272793BAA1D33C32576B48756063F4A9BB97E8FFA276809CF4C3956CC457E48C577BDF359C1ECF5CF665A68135CAED17E972DC053A6AFBAAC3BA0ECBAFEB05
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset de_BE DAYS_OF_WEEK_ABBREV [list \. "Son"\. "Mon"\. "Die"\. "Mit"\. "Don"\. "Fre"\. "Sam"]. ::msgcat::mcset de_BE DAYS_OF_WEEK_FULL [list \. "Sonntag"\. "Montag"\. "Dienstag"\. "Mittwoch"\. "Donnerstag"\. "Freitag"\. "Samstag"]. ::msgcat::mcset de_BE MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "M\u00e4r"\. "Apr"\. "Mai"\. "Jun"\. "Jul"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Dez"\. ""]. ::msgcat::mcset de_BE MONTHS_FULL [list \. "Januar"\. "Februar"\. "M\u00e4rz"\. "April"\. "Mai"\. "Juni"\. "Juli"\. "August"\. "September"\. "Oktober"\. "November"\. "Dezember"\. ""]. ::msgcat::mcset de_BE AM "vorm". ::msgcat::mcs
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2252
                                                                                      Entropy (8bit):4.313031807335687
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8+v+39bYW4v+0Wn4Obg+EKkJQg9UWWY+YcYGV97Wu9TJGJABRF6RrJFdsvjt:468XxCSpAWL8jdL
                                                                                      MD5:E152787B40C5E30699AD5E9B0C60DC07
                                                                                      SHA1:4FB9DB6E784E1D28E632B55ED31FBBB4997BF575
                                                                                      SHA-256:9B2F91BE34024FBCF645F6EF92460E5F944CA6A16268B79478AB904B2934D357
                                                                                      SHA-512:DE59E17CAB924A35C4CC74FE8FCA4776BD49E30C224E476741A273A74BBE40CDAAEDBF6BBB5E30011CD0FEED6B2840F607FD0F1BD3E136E7FE39BAE81C7ED4DB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset el DAYS_OF_WEEK_ABBREV [list \. "\u039a\u03c5\u03c1"\. "\u0394\u03b5\u03c5"\. "\u03a4\u03c1\u03b9"\. "\u03a4\u03b5\u03c4"\. "\u03a0\u03b5\u03bc"\. "\u03a0\u03b1\u03c1"\. "\u03a3\u03b1\u03b2"]. ::msgcat::mcset el DAYS_OF_WEEK_FULL [list \. "\u039a\u03c5\u03c1\u03b9\u03b1\u03ba\u03ae"\. "\u0394\u03b5\u03c5\u03c4\u03ad\u03c1\u03b1"\. "\u03a4\u03c1\u03af\u03c4\u03b7"\. "\u03a4\u03b5\u03c4\u03ac\u03c1\u03c4\u03b7"\. "\u03a0\u03ad\u03bc\u03c0\u03c4\u03b7"\. "\u03a0\u03b1\u03c1\u03b1\u03c3\u03ba\u03b5\u03c5\u03ae"\. "\u03a3\u03ac\u03b2\u03b2\u03b1\u03c4\u03bf"]. ::msgcat::mcset el MONTHS_ABBREV [list \. "\u0399\u03b1\u03bd"\. "\u03a6\u03b5\u03b2"\. "\u039c\u03b1\u03c1"\. "\u0391\u03c0\u03c1"\. "\u039c\u03b1\u03ca"\. "\u0399\u03bf\u03c5\u03bd"\. "\u
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):300
                                                                                      Entropy (8bit):4.849761581276844
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoCwmGjbJFLoCws6W3vULoCws6W3v6p6HH5oCwmT+3vjb0y6:4EnLzu8brJFqs6W3v3s6W3v6QQJ3vK
                                                                                      MD5:F8AE50E60590CC1FF7CCC43F55B5B8A8
                                                                                      SHA1:52892EDDFA74DD4C8040F9CDD19A9536BFF72B6E
                                                                                      SHA-256:B85C9A373FF0F036151432652DD55C182B0704BD0625EA84BED1727EC0DE3DD8
                                                                                      SHA-512:8E15C9CA9A7D2862FDBA330F59BB177B06E5E3154CF3EA948B8E4C0282D66E75E18C225F28F6A203B4643E8BCAA0B5BDB59578A4C20D094F8B923650796E2E72
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_AU DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset en_AU TIME_FORMAT "%H:%M:%S". ::msgcat::mcset en_AU TIME_FORMAT_12 "%I:%M:%S %P %z". ::msgcat::mcset en_AU DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):305
                                                                                      Entropy (8bit):4.823881517188826
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoCr3FD/LoCsX3vtfNrFLoCsX3v6YNn5oCs+3v3FnN9:4EnLzu863FD/U3vtNm3v6yt3v3FnN9
                                                                                      MD5:A0BB5A5CC6C37C12CB24523198B82F1C
                                                                                      SHA1:B7A6B4BFB6533CC33A0A0F5037E55A55958C4DFC
                                                                                      SHA-256:596AC02204C845AA74451FC527645549F2A3318CB63051FCACB2BF948FD77351
                                                                                      SHA-512:9859D8680E326C2EB39390F3B96AC0383372433000A4E828CF803323AB2AB681B2BAE87766CB6FB23F6D46DBA38D3344BC4A941AFB0027C737784063194F9AE4
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_BE DATE_FORMAT "%d %b %Y". ::msgcat::mcset en_BE TIME_FORMAT "%k:%M:%S". ::msgcat::mcset en_BE TIME_FORMAT_12 "%k h %M min %S s %z". ::msgcat::mcset en_BE DATE_TIME_FORMAT "%d %b %Y %k:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.869619023232552
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmosmGvNLoss6W3v6aZosmT+3vR6HK:4EnLzu8WrvNbs6W3v6aBJ3voq
                                                                                      MD5:ECC735522806B18738512DC678D01A09
                                                                                      SHA1:EEEC3A5A3780DBA7170149C779180748EB861B86
                                                                                      SHA-256:340804F73B620686AB698B2202191D69227E736B1652271C99F2CFEF03D72296
                                                                                      SHA-512:F46915BD68249B5B1988503E50EBC48C13D9C0DDBDCBA9F520386E41A0BAAE640FD97A5085698AB1DF65640CE70AC63ED21FAD49AF54511A5543D1F36247C22D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_BW DATE_FORMAT "%d %B %Y". ::msgcat::mcset en_BW TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset en_BW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):288
                                                                                      Entropy (8bit):4.828989678102087
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoAhgqH5oAZF3vGoAZF3v6loAh9+3vnFDLq:4EnLzu8mhgqHFZF3vGZF3v65hI3v9G
                                                                                      MD5:F9A9EE00A4A2A899EDCCA6D82B3FA02A
                                                                                      SHA1:BFDBAD5C0A323A37D5F91C37EC899B923DA5B0F5
                                                                                      SHA-256:C9FE2223C4949AC0A193F321FC0FD7C344A9E49A54B00F8A4C30404798658631
                                                                                      SHA-512:4E5471ADE75E0B91A02A30D8A042791D63565487CBCA1825EA68DD54A3AE6F1E386D9F3B016D233406D4B0B499B05DF6295BC0FFE85E8AA9DA4B4B7CC0128AD9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_CA DATE_FORMAT "%d/%m/%y". ::msgcat::mcset en_CA TIME_FORMAT "%r". ::msgcat::mcset en_CA TIME_FORMAT_12 "%I:%M:%S %p". ::msgcat::mcset en_CA DATE_TIME_FORMAT "%a %d %b %Y %r %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):279
                                                                                      Entropy (8bit):4.84511182583436
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoEbtvqH5oELE3vG5oELE3v6X5oEbto+3vnFDoAov:4EnLzu8ibtvqHBLE3v4LE3v6RbtF3v98
                                                                                      MD5:07C16C81F1B59444508D0F475C2DB175
                                                                                      SHA1:DEDBDB2C9ACA932C373C315FB6C5691DBEDEB346
                                                                                      SHA-256:AE38AD5452314B0946C5CB9D3C89CDFC2AD214E146EB683B8D0CE3FE84070FE1
                                                                                      SHA-512:F13333C975E6A0AD06E57C5C1908ED23C4A96008A895848D1E2FE7985001B2E5B9B05C4824C74EDA94E0CC70EC7CABCB103B97E54E957F986D8F277EEC3325B7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_GB DATE_FORMAT "%d/%m/%y". ::msgcat::mcset en_GB TIME_FORMAT "%T". ::msgcat::mcset en_GB TIME_FORMAT_12 "%T". ::msgcat::mcset en_GB DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):321
                                                                                      Entropy (8bit):4.803235346516854
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoa/5oaQ9woaAx/G4FLoaYYW3v6aZoaAx/T+3v4x6HK:4EnLzu8cpZF4F7xW3v6ah/3v4Iq
                                                                                      MD5:27B4185EB5B4CAAD8F38AE554231B49A
                                                                                      SHA1:67122CAA8ECA829EC0759A0147C6851A6E91E867
                                                                                      SHA-256:C9BE2C9AD31D516B508D01E85BCCA375AAF807D6D8CD7C658085D5007069FFFD
                                                                                      SHA-512:003E5C1E2ECCCC48D14F3159DE71A5B0F1471275D4051C7AC42A3CFB80CAF651A5D04C4D8B868158211E8BC4E08554AF771993B0710E6625AA3AE912A33F5487
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_HK AM "AM". ::msgcat::mcset en_HK PM "PM". ::msgcat::mcset en_HK DATE_FORMAT "%B %e, %Y". ::msgcat::mcset en_HK TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset en_HK DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):279
                                                                                      Entropy (8bit):4.78446779523026
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoK6qH5oKi+3vG5oKi+3v6X5oKv+3vnFDoAov:4EnLzu8vqHr3vQ3v6O3v9dy
                                                                                      MD5:30E351D26DC3D514BC4BF4E4C1C34D6F
                                                                                      SHA1:FA87650F840E691643F36D78F7326E925683D0A8
                                                                                      SHA-256:E7868C80FD59D18BB15345D29F5292856F639559CFFD42EE649C16C7938BF58D
                                                                                      SHA-512:5AAC8A55239A909207E73EFB4123692D027F7728157D07FAFB629AF5C6DB84B35CF11411E561851F7CDB6F25AEC174E85A1982C4B79C7586644E74512F5FBDDA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_IE DATE_FORMAT "%d/%m/%y". ::msgcat::mcset en_IE TIME_FORMAT "%T". ::msgcat::mcset en_IE TIME_FORMAT_12 "%T". ::msgcat::mcset en_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):310
                                                                                      Entropy (8bit):4.756550208645364
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoKr3v5oKrGaoKr5vvNLoKrw3vULoKr5o+3voA6:4EnLzu8si2vvNa3vuF3vo3
                                                                                      MD5:1423A9CF5507A198580D84660D829133
                                                                                      SHA1:70362593A2B04CF965213F318B10E92E280F338D
                                                                                      SHA-256:71E5367FE839AFC4338C50D450F111728E097538ECACCC1B17B10238001B0BB1
                                                                                      SHA-512:C4F1AD41D44A2473531247036BEEF8402F7C77A21A33690480F169F35E78030942FD31C9331A82B8377D094E22D506C785D0311DBB9F1C2B4AD3575B3F0E76E3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_IN AM "AM". ::msgcat::mcset en_IN PM "PM". ::msgcat::mcset en_IN DATE_FORMAT "%d %B %Y". ::msgcat::mcset en_IN TIME_FORMAT "%H:%M:%S". ::msgcat::mcset en_IN DATE_TIME_FORMAT "%d %B %Y %H:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):300
                                                                                      Entropy (8bit):4.89415873600679
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoyejbJFLo63vULo63v6p6HH5oy7+3vjb0y6:4EnLzu8YeJFL3vI3v6QtS3vK
                                                                                      MD5:DB734349F7A1A83E1CB18814DB6572E8
                                                                                      SHA1:3386B2599C7C170A03E4EED68C39EAC7ADD01708
                                                                                      SHA-256:812DB204E4CB8266207A4E948FBA3DD1EFE4D071BBB793F9743A4320A1CEEBE3
                                                                                      SHA-512:EF09006552C624A2F1C62155251A18BDA9EE85C9FC81ABBEDE8416179B1F82AD0D88E42AB0A10B4871EF4B7DB670E4A824392339976C3C95FB31F588CDE5840D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_NZ DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset en_NZ TIME_FORMAT "%H:%M:%S". ::msgcat::mcset en_NZ TIME_FORMAT_12 "%I:%M:%S %P %z". ::msgcat::mcset en_NZ DATE_TIME_FORMAT "%e/%m/%Y %H:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):321
                                                                                      Entropy (8bit):4.775448167269054
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoJ5oXo2e4FLoe3v6aZo27+3v4x6HK:4EnLzu8l4Fj3v6aE3v4Iq
                                                                                      MD5:787C83099B6E4E80AC81DD63BA519CBE
                                                                                      SHA1:1971ACFAA5753D2914577DCC9EBDF43CF89C1D00
                                                                                      SHA-256:BE107F5FAE1E303EA766075C52EF2146EF149EDA37662776E18E93685B176CDC
                                                                                      SHA-512:527A36D64B4B5C909F69AA8609CFFEBBA19A378CEA618E1BB07EC2AED89E456E2292080C43917DF51B08534A1D0B35F2069008324C99A7688BBEDE49049CD8A2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_PH AM "AM". ::msgcat::mcset en_PH PM "PM". ::msgcat::mcset en_PH DATE_FORMAT "%B %e, %Y". ::msgcat::mcset en_PH TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset en_PH DATE_TIME_FORMAT "%B %e, %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.865159200607995
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoQW53FD/LoQGuX3v6ZhLoQWa+3v3F0fJ:4EnLzu8283FD/LJ3v6Xc3v3F4
                                                                                      MD5:3045036D8F0663E26796E4E8AFF144E2
                                                                                      SHA1:6C9066396C107049D861CD0A9C98DE8753782571
                                                                                      SHA-256:B8D354519BD4EB1004EB7B25F4E23FD3EE7F533A5F491A46D19FD520ED34C930
                                                                                      SHA-512:EBA6CD05BD596D0E8C96BBCA86379F003AD31E564D9CB90C906AF4B3A776AA797FC18EC405781F83493BBB33510DEDC0E78504AD1E6977BE0F83B2959AD25B8A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_SG DATE_FORMAT "%d %b %Y". ::msgcat::mcset en_SG TIME_FORMAT_12 "%P %I:%M:%S". ::msgcat::mcset en_SG DATE_TIME_FORMAT "%d %b %Y %P %I:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):245
                                                                                      Entropy (8bit):4.89152584889677
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoOr0l5oOK3v6wLoOs+3v0l6C:4EnLzu8WL3v663vlC
                                                                                      MD5:F285A8BA3216DA69B764991124F2F75A
                                                                                      SHA1:A5B853A39D944DB9BB1A4C0B9D55AFDEF0515548
                                                                                      SHA-256:98CE9CA4BB590BA5F922D6A196E5381E19C64E7682CDBEF914F2DCE6745A7332
                                                                                      SHA-512:05695E29BA10072954BC91885A07D74EFBCB81B0DE3961261381210A51968F99CE1801339A05B810A54295E53B0A7E1D75CA5350485A8DEBFFFCBD4945234382
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_ZA DATE_FORMAT "%Y/%m/%d". ::msgcat::mcset en_ZA TIME_FORMAT_12 "%I:%M:%S". ::msgcat::mcset en_ZA DATE_TIME_FORMAT "%Y/%m/%d %I:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.888960668540414
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoEmGvNLoEs6W3v6aZoEmT+3vR6HK:4EnLzu8urvNDs6W3v6a5J3voq
                                                                                      MD5:D8878533B11C21445CAEFA324C638C7E
                                                                                      SHA1:EFF82B28741FA16D2DFC93B5421F856D6F902509
                                                                                      SHA-256:91088BBBF58A704185DEC13DBD421296BBD271A1AEBBCB3EF85A99CECD848FF8
                                                                                      SHA-512:CBFD4FC093B3479AE9E90A5CA05EA1894F62DA9E0559ACC2BD37BBED1F0750ECFF13E6DF2078D68268192CA51A832E1BEED379E11380ADF3C91C1A01A352B20C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset en_ZW DATE_FORMAT "%d %B %Y". ::msgcat::mcset en_ZW TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset en_ZW DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1231
                                                                                      Entropy (8bit):4.282246801138565
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8CouOZBQpsS9C58mTXv8/s5pkPXvRvm:46nZ6psX8mT/cYpmfFm
                                                                                      MD5:FE2F92E5C0AB19CDC7119E70187479F6
                                                                                      SHA1:A14B9AA999C0BBD9B21E6A2B44A934D685897430
                                                                                      SHA-256:50DF3E0E669502ED08DD778D0AFEDF0F71993BE388B0FCAA1065D1C91BD22D83
                                                                                      SHA-512:72B4975DC2CAB725BD6557CAED41B9C9146E0DE167EE0A0723C3C90D7CF49FB1D749977042FFECBCD7D8F21509307AAB3CE80E3C51023D22072FB5B415801EA9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset eo DAYS_OF_WEEK_ABBREV [list \. "di"\. "lu"\. "ma"\. "me"\. "\u0135a"\. "ve"\. "sa"]. ::msgcat::mcset eo DAYS_OF_WEEK_FULL [list \. "diman\u0109o"\. "lundo"\. "mardo"\. "merkredo"\. "\u0135a\u016ddo"\. "vendredo"\. "sabato"]. ::msgcat::mcset eo MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "a\u016dg"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset eo MONTHS_FULL [list \. "januaro"\. "februaro"\. "marto"\. "aprilo"\. "majo"\. "junio"\. "julio"\. "a\u016dgusto"\. "septembro"\. "oktobro"\. "novembro"\. "decembro"\. ""]. ::msgcat::mcset eo BCE "aK". ::msgcat::mcset e
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1180
                                                                                      Entropy (8bit):4.216657382642579
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8OJccwdQSBJr/S3tFA7C28/sF9AaD5rYrvtAvrG:46w3wdJB1/6FA22c49XrY7tWrG
                                                                                      MD5:022CBA4FF73CF18D63D1B0C11D058B5D
                                                                                      SHA1:8B2D0BE1BE354D639EC3373FE20A0F255E312EF6
                                                                                      SHA-256:FFF2F08A5BE202C81E469E16D4DE1F8A0C1CFE556CDA063DA071279F29314837
                                                                                      SHA-512:5142AD14C614E6BA5067B371102F7E81B14EB7AF3E40D05C674CFF1052DA4D172768636D34FF1DEE2499E43B2FEB4771CB1B67EDA10B887DE50E15DCD58A5283
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es DAYS_OF_WEEK_ABBREV [list \. "dom"\. "lun"\. "mar"\. "mi\u00e9"\. "jue"\. "vie"\. "s\u00e1b"]. ::msgcat::mcset es DAYS_OF_WEEK_FULL [list \. "domingo"\. "lunes"\. "martes"\. "mi\u00e9rcoles"\. "jueves"\. "viernes"\. "s\u00e1bado"]. ::msgcat::mcset es MONTHS_ABBREV [list \. "ene"\. "feb"\. "mar"\. "abr"\. "may"\. "jun"\. "jul"\. "ago"\. "sep"\. "oct"\. "nov"\. "dic"\. ""]. ::msgcat::mcset es MONTHS_FULL [list \. "enero"\. "febrero"\. "marzo"\. "abril"\. "mayo"\. "junio"\. "julio"\. "agosto"\. "septiembre"\. "octubre"\. "noviembre"\. "diciembre"\. ""]. ::msgcat::mcset es BCE "a.C.". ::msgcat::mcset es
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):242
                                                                                      Entropy (8bit):4.830874390627383
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmo8GUFLot/W3vULo8T+3v9y6:4EnLzu8KGUFN3v+K3v3
                                                                                      MD5:C806EF01079E6B6B7EAE5D717DA2AAB3
                                                                                      SHA1:3C553536241A5D2E95A3BA9024AAB46BB87FBAD9
                                                                                      SHA-256:AF530ACD69676678C95B803A29A44642ED2D2F2D077CF0F47B53FF24BAC03B2E
                                                                                      SHA-512:619905C2FB5F8D2BC2CBB9F8F0EA117C0AEFBDDE5E4F826FF962D7DC069D16D5DE12E27E898471DC6C039866FB64BBF62ED54DBC031E03C7D24FC2EA38DE5699
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_AR DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_AR TIME_FORMAT "%H:%M:%S". ::msgcat::mcset es_AR DATE_TIME_FORMAT "%d/%m/%Y %H:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.878640071219599
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoYePWHFLoU3v6rZoY7+3vPUe6HK:4EnLzu8OegFp3v6rHS3vs3q
                                                                                      MD5:4C2B2A6FBC6B514EA09AA9EF98834F17
                                                                                      SHA1:853FFCBB9A2253B7DC2B82C2BFC3B132500F7A9D
                                                                                      SHA-256:24B58DE38CD4CB2ABD08D1EDA6C9454FFDE7ED1A33367B457D7702434A0A55EE
                                                                                      SHA-512:3347F9C13896AF19F6BAFBEF225AF2A1F84F20F117E7F0CE3E5CAA783FDD88ABDFAF7C1286AE421BC609A39605E16627013945E4ACA1F7001B066E14CAB90BE7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_BO DATE_FORMAT "%d-%m-%Y". ::msgcat::mcset es_BO TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_BO DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.889615718638578
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmodvPWHFLok3v6rZodo+3vPUe6HK:4EnLzu8DgF93v6rC3vs3q
                                                                                      MD5:B7E7BE63F24FC1D07F28C5F97637BA1C
                                                                                      SHA1:8FE1D17696C910CF59467598233D55268BFE0D94
                                                                                      SHA-256:12AD1546EB391989105D80B41A87686D3B30626D0C42A73705F33B2D711950CC
                                                                                      SHA-512:FD8B83EF06B1E1111AFF186F5693B17526024CAD8CC99102818BE74FD885344D2F628A0541ABB485F38DB8DE7E29EA4EE4B28D8E5F6ECEF826BABE1013ABDFB8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_CL DATE_FORMAT "%d-%m-%Y". ::msgcat::mcset es_CL TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_CL DATE_TIME_FORMAT "%d-%m-%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.862231219172699
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmo4FjbJFLo4F+3v6rZo4++3vjb0f6HK:4EnLzu8QJFL+3v6rv3vbq
                                                                                      MD5:FD946BE4D44995911E79135E5B7BD3BB
                                                                                      SHA1:3BA38CB03258CA834E37DBB4E3149D4CDA9B353B
                                                                                      SHA-256:1B4979874C3F025317DFCF0B06FC8CEE080A28FF3E8EFE1DE9E899F6D4F4D21E
                                                                                      SHA-512:FBD8087891BA0AE58D71A6D07482EED5E0EA5C658F0C82A9EC67DFC0D826059F1FC6FF404D6A6DC9619BD9249D4E4EC30D828B177E0939302196C51FA9B2FC4B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_CO DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset es_CO TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_CO DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.873281593259653
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmo76GUFLoTW3v6rZo76T+3v9f6HK:4EnLzu8d6GUF73v6rq6K3vMq
                                                                                      MD5:F08EF3582AF2F88B71C599FBEA38BFD9
                                                                                      SHA1:456C90C09C2A8919DC948E86170F523062F135DB
                                                                                      SHA-256:7AC5FC35BC422A5445603E0430236E62CCA3558787811DE22305F72D439EB4BB
                                                                                      SHA-512:7187FC4CE0533F14BBA073039A0B86D610618573BA9A936CBE7682ED2939384C6BB9E0A407C016A42702E83627CCE394618ACB58419EA36908AA37F59165E371
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_CR DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_CR TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_CR DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.8668686830029335
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmomerQZnFLou3v6rZom7+3vrQZg6HK:4EnLzu8xkZFH3v6rM3vkrq
                                                                                      MD5:44F2EE567A3E9A021A3C16062CEAE220
                                                                                      SHA1:180E938584F0A57AC0C3F85E6574BC48291D820E
                                                                                      SHA-256:847C14C297DBE4D8517DEBAA8ED555F3DAEDF843D6BAD1F411598631A0BD3507
                                                                                      SHA-512:BEB005D006E432963F9C1EF474A1E3669C8B7AF0681681E74DDA8FE9C8EE04D307EF85CF0257DA72663026138D38807A6ABA1255337CF8CC724ED1993039B40C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_DO DATE_FORMAT "%m/%d/%Y". ::msgcat::mcset es_DO TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_DO DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.86970949384834
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmozgUFLoro+3v6rZoz9+3v9f6HK:4EnLzu8ZgUFcF3v6ruI3vMq
                                                                                      MD5:CCB036C33BA7C8E488D37E754075C6CF
                                                                                      SHA1:336548C8D361B1CAA8BDF698E148A88E47FB27A6
                                                                                      SHA-256:2086EE8D7398D5E60E5C3048843B388437BD6F2507D2293CA218936E3BF61E59
                                                                                      SHA-512:05058262E222653CF3A4C105319B74E07322AEE726CC11AEB2B562F01FF2476E3169EA829BF8B66E1B76617CB58E45423480E5A6CB3B3D4B33AA4DDDFA52D111
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_EC DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_EC TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_EC DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.86395314548955
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmohvjbJFLoI3v6rZoho+3vjb0f6HK:4EnLzu8PJFB3v6r23vbq
                                                                                      MD5:1E6062716A094CC3CE1F2C97853CD3CD
                                                                                      SHA1:499F69E661B3B5747227B31DE4539CAF355CCAAC
                                                                                      SHA-256:1BC22AF98267D635E3F07615A264A716940A2B1FAA5CAA3AFF54D4C5A4A34370
                                                                                      SHA-512:7C3FB65EC76A2F35354E93A47C3A59848170AAF504998CEF66AEBAAD39D303EC67BE212C6FACC98305E35FFEBF23CCB7E34396F11987E81D76B3685E6B5E89B3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_GT DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset es_GT TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_GT DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.902544453689719
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoIvriP/FLoP3v6rZoIo+3vrig6HK:4EnLzu8w+nF+3v6rP3v+lq
                                                                                      MD5:AAE4A89F6AB01044D6BA3511CBE6FE66
                                                                                      SHA1:639A94279453B0028995448FD2E221C1BDE23CEE
                                                                                      SHA-256:A2D25880C64309552AACED082DEED1EE006482A14CAB97DB524E9983EE84ACFC
                                                                                      SHA-512:E2BE94973C931B04C730129E9B9746BB76E7AC7F5AAA8D7899903B8C86B4E3D4A955E9580CF2C64DE48AFD6A2A9386337C2F8A8128A511AFBFBBA09CC032A76E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_HN DATE_FORMAT "%m-%d-%Y". ::msgcat::mcset es_HN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_HN DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.863953145489551
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoPjbJFLoH+3v6rZoI+3vjb0f6HK:4EnLzu8NJF73v6rE3vbq
                                                                                      MD5:F60290CF48AA4EDCA938E496F43135FD
                                                                                      SHA1:0EE5A36277EA4E7A1F4C6D1D9EE32D90918DA25C
                                                                                      SHA-256:D0FAA9D7997D5696BFF92384144E0B9DFB2E4C38375817613F81A89C06EC6383
                                                                                      SHA-512:380DFCD951D15E53FCB1DEF4B892C8FD65CEFBF0857D5A7347FF3ED34F69ADD53AEEF895EDCFC6D2F24A65AB8F67CF813AEA2045EDBF3BF182BD0635B5ACB1A4
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_MX DATE_FORMAT "%e/%m/%Y". ::msgcat::mcset es_MX TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_MX DATE_TIME_FORMAT "%e/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.872124246425178
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoe/GriP/FLo3W3v6rZoe/T+3vrig6HK:4EnLzu8Ae+nFmW3v6rxS3v+lq
                                                                                      MD5:2C4C45C450FEA6BA0421281F1CF55A2A
                                                                                      SHA1:5249E31611A670EAEEF105AB4AD2E5F14B355CAE
                                                                                      SHA-256:4B28B46981BBB78CBD2B22060E2DD018C66FCFF1CEE52755425AD4900A90D6C3
                                                                                      SHA-512:969A4566C7B5FAF36204865D5BC22C849FBB44F0D16B04B9A9473B05DBABF22AEB9B77F282A44BB85D7E2A56C4E5BCE59E4E4CDEB3F6DD52AF47C65C709A3690
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_NI DATE_FORMAT "%m-%d-%Y". ::msgcat::mcset es_NI TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_NI DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.860352858208512
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoX5rQZnFLoHE3v6rZoXa+3vrQZg6HK:4EnLzu8vkZF93v6rm3vkrq
                                                                                      MD5:148626186A258E58851CC0A714B4CFD6
                                                                                      SHA1:7F14D46F66D8A94A493702DCDE7A50C1D71774B2
                                                                                      SHA-256:6832DC5AB9F610883784CF702691FCF16850651BC1C6A77A0EFA81F43BC509AC
                                                                                      SHA-512:2B452D878728BFAFEA9A60030A26E1E1E44CE0BB26C7D9B8DB1D7C4F1AD3217770374BD4EDE784D0A341AB5427B08980FF4A62141FAF7024AB17296FE98427AC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_PA DATE_FORMAT "%m/%d/%Y". ::msgcat::mcset es_PA TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_PA DATE_TIME_FORMAT "%m/%d/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.8632965835916195
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoIgUFLoQ9X3v6rZoI9+3v9f6HK:4EnLzu8jUFZ3v6rS3vMq
                                                                                      MD5:74F014096C233B4D1D38A9DFB15B01BB
                                                                                      SHA1:75C28321AFED3D9CDA3EBF3FD059CDEA597BB13A
                                                                                      SHA-256:CC826C93682EF19D29AB6304657E07802C70CF18B1E5EA99C3480DF6D2383983
                                                                                      SHA-512:24E7C3914BF095B55DE7F01CB537E20112E10CF741333FD0185FEF0B0E3A1CD9651C2B2EDC470BCF18F51ADB352CA7550CFBF4F79342DCA33F7E0841AEDEBA8D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_PE DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_PE TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_PE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.859298425911738
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmo06GriP/FLoeW3v6rZo06T+3vrig6HK:4EnLzu8ZG+nFy3v6rAK3v+lq
                                                                                      MD5:AEB569C12A50B8C4A57C8034F666C1B3
                                                                                      SHA1:24D8B096DD8F1CFA101D6F36606D003D4FCC7B4D
                                                                                      SHA-256:19563225CE7875696C6AA2C156E6438292DE436B58F8D7C23253E3132069F9A2
                                                                                      SHA-512:B5432D7A80028C3AD3A7819A5766B07EDB56CEE493C0903EDFA72ACEE0C2FFAA955A8850AA48393782471905FFF72469F508B19BE83CC626478072FFF6B60B5D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_PR DATE_FORMAT "%m-%d-%Y". ::msgcat::mcset es_PR TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_PR DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.871431420165191
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmo/5UFLovE3v6rZo/a+3v9f6HK:4EnLzu8XUF13v6re3vMq
                                                                                      MD5:D24FF8FAEE658DD516AC298B887D508A
                                                                                      SHA1:61990E6F3E399B87060E522ABCDE77A832019167
                                                                                      SHA-256:94FF64201C27AB04F362617DD56B7D85B223BCCA0735124196E7669270C591F0
                                                                                      SHA-512:1409E1338988BC70C19DA2F6C12A39E311CF91F6BB759575C95E125EA67949F17BBE450B2CD29E3F6FDA1421C742859CB990921949C6940B34D7A8B8545FF8F0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_PY DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_PY TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_PY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.883202808381857
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmofriP/FLo3+3v6rZoY+3vrig6HK:4EnLzu89+nFO+3v6rw3v+lq
                                                                                      MD5:6A013D20A3C983639EAF89B93AB2037C
                                                                                      SHA1:9ABEC22E82C1638B9C8E197760C66E370299BB93
                                                                                      SHA-256:E3268C95E9B7D471F5FD2436C17318D5A796220BA39CEBEBCD39FBB0141A49CE
                                                                                      SHA-512:C4FE0493A2C45DA792D0EE300EC1D30E25179209FE39ACCD74B23ACDFF0A72DEEEED1A1D12842101E0A4E57E8FEADF54F926347B6E9B987B70A52E0557919FC2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_SV DATE_FORMAT "%m-%d-%Y". ::msgcat::mcset es_SV TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_SV DATE_TIME_FORMAT "%m-%d-%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.877844330421912
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmooygUFLooq9X3v6rZooy9+3v9f6HK:4EnLzu8SrUFzsX3v6rZJ3vMq
                                                                                      MD5:40250432AD0DC4FF168619719F91DBCA
                                                                                      SHA1:D38532CA84E80FE70C69108711E3F9A7DFD5230F
                                                                                      SHA-256:BA557A3C656275A0C870FB8466F2237850F5A7CF2D001919896725BB3D3EAA4B
                                                                                      SHA-512:26FB4B3332E2C06628869D4C63B7BAB4F42FF73D1D4FD8603323A93067F60D9505C70D1A14D7E34A9880E2993183FC09D43013F3BEB8BC48732F08181643D05D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_UY DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_UY TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_UY DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.882638228899482
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoXrUFLoXK3v6rZoXs+3v9f6HK:4EnLzu8VUFH3v6r83vMq
                                                                                      MD5:F3A789CBC6B9DD4F5BA5182C421A9F78
                                                                                      SHA1:7C2AF280C90B0104AB49B2A527602374254274CE
                                                                                      SHA-256:64F796C5E3E300448A1F309A0DA7D43548CC40511036FF3A3E0C917E32147D62
                                                                                      SHA-512:822C0D27D2A72C9D5336C1BCEDC13B564F0FB12146CF8D30FBE77B9C4728C4B3BF456AC62DACD2962A6B5B84761354B31CD505105EDB060BF202BA0B0A830772
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset es_VE DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset es_VE TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset es_VE DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1206
                                                                                      Entropy (8bit):4.321464868793769
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8W1Yn1YZ1waUuvVTGiMiLpBgoVTJ01iLTh/w2SJmG5F1svtFmsv5d:46K1y1Mv9GrM9oc/FSJmG5F1KtFmK5d
                                                                                      MD5:3B4BEE5DD7441A63A31F89D6DFA059BA
                                                                                      SHA1:BEE39E45FA3A76B631B4C2D0F937FF6041E09332
                                                                                      SHA-256:CCC2B4738DB16FAFB48BFC77C9E2F8BE17BC19E4140E48B61F3EF1CE7C9F3A8C
                                                                                      SHA-512:AEC24C75CB00A506A46CC631A2A804C59FBE4F8EBCB86CBA0F4EE5DF7B7C12ED7D25845150599837B364E40BBFDB68244991ED5AF59C9F7792F8362A1E728883
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset et DAYS_OF_WEEK_ABBREV [list \. "P"\. "E"\. "T"\. "K"\. "N"\. "R"\. "L"]. ::msgcat::mcset et DAYS_OF_WEEK_FULL [list \. "p\u00fchap\u00e4ev"\. "esmasp\u00e4ev"\. "teisip\u00e4ev"\. "kolmap\u00e4ev"\. "neljap\u00e4ev"\. "reede"\. "laup\u00e4ev"]. ::msgcat::mcset et MONTHS_ABBREV [list \. "Jaan"\. "Veebr"\. "M\u00e4rts"\. "Apr"\. "Mai"\. "Juuni"\. "Juuli"\. "Aug"\. "Sept"\. "Okt"\. "Nov"\. "Dets"\. ""]. ::msgcat::mcset et MONTHS_FULL [list \. "Jaanuar"\. "Veebruar"\. "M\u00e4rts"\. "Aprill"\. "Mai"\. "Juuni"\. "Juuli"\. "August"\. "September"\. "Oktoober"\. "November"\. "Detsember"\. ""]. ::msgcat::mcset et
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):985
                                                                                      Entropy (8bit):3.9137059580146376
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu80P6/XTPi6/XTotXSSzTGsy+trjz4HsKI:46qWKWoX75Bb4Mv
                                                                                      MD5:E27FEB15A6C300753506FC706955AC90
                                                                                      SHA1:FDFAC22CC0839B29799001838765EB4A232FD279
                                                                                      SHA-256:7DCC4966A5C13A52B6D1DB62BE200B9B5A1DECBACCFCAF15045DD03A2C3E3FAA
                                                                                      SHA-512:C54A0F72BC0DAF6A411466565467A2783690EA19F4D401A5448908944A0A6F3F74A7976FA0F851F15B6A97C6D6A3C41FB8BBC8EA42B5D5E3C17A5C8A37436FC5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset eu DAYS_OF_WEEK_ABBREV [list \. "igandea"\. "astelehena"\. "asteartea"\. "asteazkena"\. "osteguna"\. "ostirala"\. "larunbata"]. ::msgcat::mcset eu DAYS_OF_WEEK_FULL [list \. "igandea"\. "astelehena"\. "asteartea"\. "asteazkena"\. "osteguna"\. "ostirala"\. "larunbata"]. ::msgcat::mcset eu MONTHS_ABBREV [list \. "urt"\. "ots"\. "mar"\. "api"\. "mai"\. "eka"\. "uzt"\. "abu"\. "ira"\. "urr"\. "aza"\. "abe"\. ""]. ::msgcat::mcset eu MONTHS_FULL [list \. "urtarrila"\. "otsaila"\. "martxoa"\. "apirila"\. "maiatza"\. "ekaina"\. "uztaila"\. "abuztua"\. "iraila"\. "urria"\. "azaroa"\. "abendua"\. ""].}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):287
                                                                                      Entropy (8bit):4.8689948586471825
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoszFnJF+l6VALoszw3vG5oszw3v6X5osz++3v/R3v:4EnLzu8gL+l6Vt3vf3v6P3vZf
                                                                                      MD5:D20788793E6CC1CD07B3AFD2AA135CB6
                                                                                      SHA1:3503FCB9490261BA947E89D5494998CEBB157223
                                                                                      SHA-256:935164A2D2D14815906B438562889B31139519B3A8E8DB3D2AC152A77EC591DC
                                                                                      SHA-512:F65E7D27BD0A99918D6F21C425238000563C2E3A4162D6806EEAC7C9DCB9798987AFFB8BE01899D577078F6297AF468DBAEBEB6375C09ABF332EB44E328F0E8B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset eu_ES DATE_FORMAT "%a, %Yeko %bren %da". ::msgcat::mcset eu_ES TIME_FORMAT "%T". ::msgcat::mcset eu_ES TIME_FORMAT_12 "%T". ::msgcat::mcset eu_ES DATE_TIME_FORMAT "%y-%m-%d %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1664
                                                                                      Entropy (8bit):4.1508548760580295
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8BMnqZEjgYDT0/y3xg2LSREyqyxDfsycNp/Tpn29Ey5ykDDzi:46cGTYDT0/ya4KIySNnCz2
                                                                                      MD5:7E74DE42FBDA63663B58B2E58CF30549
                                                                                      SHA1:CB210740F56208E8E621A45D545D7DEFCAE8BCAF
                                                                                      SHA-256:F9CA4819E8C8B044D7D68C97FC67E0F4CCD6245E30024161DAB24D0F7C3A9683
                                                                                      SHA-512:A03688894BD44B6AB87DC6CAB0A5EC348C9117697A2F9D00E27E850F23EFDC2ADBD53CAC6B9ED33756D3A87C9211B6EE8DF06020F6DA477B9948F52E96071F76
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fa DAYS_OF_WEEK_ABBREV [list \. "\u06cc\u2214"\. "\u062f\u2214"\. "\u0633\u2214"\. "\u0686\u2214"\. "\u067e\u2214"\. "\u062c\u2214"\. "\u0634\u2214"]. ::msgcat::mcset fa DAYS_OF_WEEK_FULL [list \. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\. "\u062f\u0648\u0634\u0646\u0628\u0647"\. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\. "\u062c\u0645\u0639\u0647"\. "\u0634\u0646\u0628\u0647"]. ::msgcat::mcset fa MONTHS_ABBREV [list \. "\u0698\u0627\u0646"\. "\u0641\u0648\u0631"\. "\u0645\u0627\u0631"\. "\u0622\u0648\u0631"\. "\u0645\u0640\u0647"\. "\u0698\u0648\u0646"\. "\u0698\u0648\u06cc"\. "\u0627\u0648\u062a"\. "\u0633\u067e\u
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1957
                                                                                      Entropy (8bit):4.433104256056609
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8XMnSZEjgYDT0g3xg2LSREyqyxDf5cNp/Tpn29Ey5ykDDzJ6v3Nev0Nv0f:46OeTYDT0ga4K9SNnCz0v9o0JI
                                                                                      MD5:E6DBD1544A69BFC653865B723395E79C
                                                                                      SHA1:5E4178E7282807476BD0D6E1F2E320E42FA0DE77
                                                                                      SHA-256:6360CE0F31EE593E311B275F3C1F1ED427E237F31010A4280EF2C58AA6F2633A
                                                                                      SHA-512:8D77DCB4333F043502CED7277AEEB0453A2C019E1A46826A0FE90F0C480A530F5646A4F76ECC1C15825601FC8B646ED7C78E53996E2908B341BA4ED1392B95F0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fa_IN DAYS_OF_WEEK_ABBREV [list \. "\u06cc\u2214"\. "\u062f\u2214"\. "\u0633\u2214"\. "\u0686\u2214"\. "\u067e\u2214"\. "\u062c\u2214"\. "\u0634\u2214"]. ::msgcat::mcset fa_IN DAYS_OF_WEEK_FULL [list \. "\u06cc\u06cc\u200c\u0634\u0646\u0628\u0647"\. "\u062f\u0648\u0634\u0646\u0628\u0647"\. "\u0633\u0647\u200c\u0634\u0646\u0628\u0647"\. "\u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647"\. "\u067e\u0646\u062c\u200c\u0634\u0646\u0628\u0647"\. "\u062c\u0645\u0639\u0647"\. "\u0634\u0646\u0628\u0647"]. ::msgcat::mcset fa_IN MONTHS_ABBREV [list \. "\u0698\u0627\u0646"\. "\u0641\u0648\u0631"\. "\u0645\u0627\u0631"\. "\u0622\u0648\u0631"\. "\u0645\u0640\u0647"\. "\u0698\u0648\u0646"\. "\u0698\u0648\u06cc"\. "\u0627\u0648\u062a"\. "\u063
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):417
                                                                                      Entropy (8bit):5.087144086729547
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu82vGz7AhF/Q3vf3v6TANv+K3vz7AA7:4azu8vPm/ivfvF9xvP9
                                                                                      MD5:044BAAA627AD3C3585D229865A678357
                                                                                      SHA1:9D64038C00253A7EEDA4921B9C5E34690E185061
                                                                                      SHA-256:CF492CBD73A6C230725225D70566B6E46D5730BD3F63879781DE4433965620BE
                                                                                      SHA-512:DA138F242B44111FAFE9EFE986EB987C26A64D9316EA5644AC4D3D4FEC6DF9F5D55F342FC194BC487A1B7C740F931D883A574863B48396D837D1E270B733F735
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fa_IR AM "\u0635\u0628\u062d". ::msgcat::mcset fa_IR PM "\u0639\u0635\u0631". ::msgcat::mcset fa_IR DATE_FORMAT "%d\u2044%m\u2044%Y". ::msgcat::mcset fa_IR TIME_FORMAT "%S:%M:%H". ::msgcat::mcset fa_IR TIME_FORMAT_12 "%S:%M:%l %P". ::msgcat::mcset fa_IR DATE_TIME_FORMAT "%d\u2044%m\u2044%Y %S:%M:%H %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1145
                                                                                      Entropy (8bit):4.249302428029841
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8ZeTWSS/DatuUSlWCBTtotL8W183eYKvt3v3eG:46sWp/DatBSPtoNmpMt/J
                                                                                      MD5:34FE8E2D987FE534BD88291046F6820B
                                                                                      SHA1:B173700C176336BD1B123C2A055A685F73B60C07
                                                                                      SHA-256:BE0D2DCE08E6CD786BC3B07A1FB1ADC5B2CF12053C99EACDDAACDDB8802DFB9C
                                                                                      SHA-512:4AC513F092D2405FEF6E30C828AE94EDBB4B0B0E1C68C1168EB2498C186DB054EBF697D6B55B49F865A2284F75B7D5490AFE7A80F887AE8312E6F9A5EFE16390
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fi DAYS_OF_WEEK_ABBREV [list \. "su"\. "ma"\. "ti"\. "ke"\. "to"\. "pe"\. "la"]. ::msgcat::mcset fi DAYS_OF_WEEK_FULL [list \. "sunnuntai"\. "maanantai"\. "tiistai"\. "keskiviikko"\. "torstai"\. "perjantai"\. "lauantai"]. ::msgcat::mcset fi MONTHS_ABBREV [list \. "tammi"\. "helmi"\. "maalis"\. "huhti"\. "touko"\. "kes\u00e4"\. "hein\u00e4"\. "elo"\. "syys"\. "loka"\. "marras"\. "joulu"\. ""]. ::msgcat::mcset fi MONTHS_FULL [list \. "tammikuu"\. "helmikuu"\. "maaliskuu"\. "huhtikuu"\. "toukokuu"\. "kes\u00e4kuu"\. "hein\u00e4kuu"\. "elokuu"\. "syyskuu"\. "lokakuu"\. "marraskuu"\. "joulukuu"\. ""]. ::msgcat
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):986
                                                                                      Entropy (8bit):4.07740021579371
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu87mY5mvAqO6RxmtV5qHbMj6aywE1ZD4ScMfRDc6VZTEpSecbLwJQT1Y4:4azu874/RqEXsSpffTBtbQQT1t
                                                                                      MD5:996B699F6821A055B826415446A11C8E
                                                                                      SHA1:C382039ED7D2AE8D96CF2EA55FA328AE9CFD2F7D
                                                                                      SHA-256:F249DD1698ED1687E13654C04D08B829193027A2FECC24222EC854B59350466A
                                                                                      SHA-512:AB6F5ABC9823C7F7A67BA1E821680ACD37761F83CD1F46EC731AB2B72AA34C2E523ACE288E9DE70DB3D58E11F5CB42ECB5A5E4E39BFD7DFD284F1FF6B637E11D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fo DAYS_OF_WEEK_ABBREV [list \. "sun"\. "m\u00e1n"\. "t\u00fds"\. "mik"\. "h\u00f3s"\. "fr\u00ed"\. "ley"]. ::msgcat::mcset fo DAYS_OF_WEEK_FULL [list \. "sunnudagur"\. "m\u00e1nadagur"\. "t\u00fdsdagur"\. "mikudagur"\. "h\u00f3sdagur"\. "fr\u00edggjadagur"\. "leygardagur"]. ::msgcat::mcset fo MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "mai"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "des"\. ""]. ::msgcat::mcset fo MONTHS_FULL [list \. "januar"\. "februar"\. "mars"\. "apr\u00edl"\. "mai"\. "juni"\. "juli"\. "august"\. "september"\. "oktober"\. "november"\. "desember"\. ""].}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):279
                                                                                      Entropy (8bit):4.816022066048386
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoZA4HFLoZd3vG5oZd3v6X5oZd+3vnFDoAov:4EnLzu8kyFO3vf3v6f3v9dy
                                                                                      MD5:A76D09A4FA15A2C985CA6BDD22989D6A
                                                                                      SHA1:E6105EBCDC547FE2E2FE9EDDC9C573BBDAD85AD0
                                                                                      SHA-256:7145B57AC5C074BCA968580B337C04A71BBD6EFB93AFAF291C1361FD700DC791
                                                                                      SHA-512:D16542A1CCDC3F5C2A20300B7E38F43F94F7753E0E99F08EB7240D4F286B263815AD481B29F4E96F268E24BA17C5E135E356448685E1BF65B2B63CE6146AA54C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fo_FO DATE_FORMAT "%d/%m-%Y". ::msgcat::mcset fo_FO TIME_FORMAT "%T". ::msgcat::mcset fo_FO TIME_FORMAT_12 "%T". ::msgcat::mcset fo_FO DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1205
                                                                                      Entropy (8bit):4.313638548211754
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8qW09HSZ2p60wTyVz5bGzJzzTK+VUuG4CNnvxvB:46JYY5moleiUb42vlB
                                                                                      MD5:B475F8E7D7065A67E73B1E5CDBF9EB1F
                                                                                      SHA1:1B689EDC29F8BC4517936E5D77A084083F12AE31
                                                                                      SHA-256:7A87E418B6D8D14D8C11D63708B38D607D28F7DDBF39606C7D8FBA22BE7892CA
                                                                                      SHA-512:EA77EFF9B23A02F59526499615C08F1314A91AB41561856ED7DF45930FDD8EC11A105218890FD012045C4CC40621C226F94BDC3BEB62B83EA8FAA7AEC20516E7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fr DAYS_OF_WEEK_ABBREV [list \. "dim."\. "lun."\. "mar."\. "mer."\. "jeu."\. "ven."\. "sam."]. ::msgcat::mcset fr DAYS_OF_WEEK_FULL [list \. "dimanche"\. "lundi"\. "mardi"\. "mercredi"\. "jeudi"\. "vendredi"\. "samedi"]. ::msgcat::mcset fr MONTHS_ABBREV [list \. "janv."\. "f\u00e9vr."\. "mars"\. "avr."\. "mai"\. "juin"\. "juil."\. "ao\u00fbt"\. "sept."\. "oct."\. "nov."\. "d\u00e9c."\. ""]. ::msgcat::mcset fr MONTHS_FULL [list \. "janvier"\. "f\u00e9vrier"\. "mars"\. "avril"\. "mai"\. "juin"\. "juillet"\. "ao\u00fbt"\. "septembre"\. "octobre"\. "novembre"\. "d\u00e9cembre"\. ""]. ::msgcat::mcset fr BCE "a
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):279
                                                                                      Entropy (8bit):4.863262857917797
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoXqH5oIX3vG5oIX3v6X5og+3vnFDoAov:4EnLzu81qHd3v63v6Y3v9dy
                                                                                      MD5:483652B6A3D8010C3CDB6CAD0AD95E72
                                                                                      SHA1:8FCDB01D0729E9F1A0CAC56F79EDB79A37734AF5
                                                                                      SHA-256:980E703DFB1EEDE7DE48C958F6B501ED4251F69CB0FBCE0FCA85555F5ACF134A
                                                                                      SHA-512:0282B8F3884BB4406F69AF2D2F44E431FB8077FEA86D09ED5607BC0932A049853D0C5CAF0B57EF0289F42A8265F76CC4B10111A28B1E0E9BD54E9319B25D8DB6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fr_BE DATE_FORMAT "%d/%m/%y". ::msgcat::mcset fr_BE TIME_FORMAT "%T". ::msgcat::mcset fr_BE TIME_FORMAT_12 "%T". ::msgcat::mcset fr_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):279
                                                                                      Entropy (8bit):4.843031408533295
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmooI9jo13vG5o13v6X5o1+3vnFDoAov:4EnLzu8eI9Q3vB3v613v9dy
                                                                                      MD5:017D816D73DAB852546169F3EC2D16F2
                                                                                      SHA1:3145BB54D9E1E4D9166186D5B43F411CE0250594
                                                                                      SHA-256:F16E212D5D1F6E83A9FC4E56874E4C7B8F1947EE882610A73199480319EFA529
                                                                                      SHA-512:4D4EF395B15F750F16EC64162BE8AB4B082C6CD1877CA63D5EA4A5E940A7F98E46D792115FD105B293DC43714E8662BC4411E14E93F09769A064622E52EDE258
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fr_CA DATE_FORMAT "%Y-%m-%d". ::msgcat::mcset fr_CA TIME_FORMAT "%T". ::msgcat::mcset fr_CA TIME_FORMAT_12 "%T". ::msgcat::mcset fr_CA DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):281
                                                                                      Entropy (8bit):4.866549204705568
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoFt2poF+3vG5oF+3v6X5o++3vnFDoAov:4EnLzu8btn+3vB+3v6+3v9dy
                                                                                      MD5:8B27EFF0D45F536852E7A819500B7F93
                                                                                      SHA1:CAED7D4334BAD8BE586A1AEEE270FB6913A03512
                                                                                      SHA-256:AB160BFDEB5C3ADF071E01C78312A81EE4223BBF5470AB880972BBF5965291F3
                                                                                      SHA-512:52DD94F524C1D9AB13F5933265691E8C44B2946F507DE30D789FDCFEA7839A4076CB55A01CEB49194134D7BC84E4F490341AAB9DFB75BB960B03829D6550872B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset fr_CH DATE_FORMAT "%d. %m. %y". ::msgcat::mcset fr_CH TIME_FORMAT "%T". ::msgcat::mcset fr_CH TIME_FORMAT_12 "%T". ::msgcat::mcset fr_CH DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1141
                                                                                      Entropy (8bit):4.24180563443443
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8qppr5xqPs5Jpwe3zESbs5JpbxK+dfJ:46ct5XGe3zwXu4fJ
                                                                                      MD5:88D5CB026EBC3605E8693D9A82C2D050
                                                                                      SHA1:C2A613DC7C367A841D99DE15876F5E7A8027BBF8
                                                                                      SHA-256:057C75C1AD70653733DCE43EA5BF151500F39314E8B0236EE80F8D5DB623627F
                                                                                      SHA-512:253575BFB722CF06937BBE4E9867704B95EFE7B112B370E1430A2027A1818BD2560562A43AD2D067386787899093B25AE84ABFE813672A15A649FEF487E31F7A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ga DAYS_OF_WEEK_ABBREV [list \. "Domh"\. "Luan"\. "M\u00e1irt"\. "C\u00e9ad"\. "D\u00e9ar"\. "Aoine"\. "Sath"]. ::msgcat::mcset ga DAYS_OF_WEEK_FULL [list \. "D\u00e9 Domhnaigh"\. "D\u00e9 Luain"\. "D\u00e9 M\u00e1irt"\. "D\u00e9 C\u00e9adaoin"\. "D\u00e9ardaoin"\. "D\u00e9 hAoine"\. "D\u00e9 Sathairn"]. ::msgcat::mcset ga MONTHS_ABBREV [list \. "Ean"\. "Feabh"\. "M\u00e1rta"\. "Aib"\. "Beal"\. "Meith"\. "I\u00fail"\. "L\u00fan"\. "MF\u00f3mh"\. "DF\u00f3mh"\. "Samh"\. "Noll"\. ""]. ::msgcat::mcset ga MONTHS_FULL [list \. "Ean\u00e1ir"\. "Feabhra"\. "M\u00e1rta"\. "Aibre\u00e1n"\. "M\u00ed na Bealtaine"\. "Meith"\. "I\u00fail"\. "L\u00fanasa"
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):279
                                                                                      Entropy (8bit):4.7755422576113595
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmobHAyg0obHAqo+3vG5obHAqo+3v6X5obHAy9+3vnFDoAov:4EnLzu8s33vj3v6r3v9dy
                                                                                      MD5:04452D43DA05A94414973F45CDD12869
                                                                                      SHA1:AEEDCC2177B592A0025A1DBCFFC0EF3634DBF562
                                                                                      SHA-256:2072E48C98B480DB5677188836485B4605D5A9D99870AC73B5BFE9DCC6DB46F4
                                                                                      SHA-512:5A01156FD5AB662EE9D626518B4398A161BAF934E3A618B3A18839A944AEEAEE6FE1A5279D7750511B126DB3AD2CC992CDA067573205ACBC211C34C8A099305F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ga_IE DATE_FORMAT "%d.%m.%y". ::msgcat::mcset ga_IE TIME_FORMAT "%T". ::msgcat::mcset ga_IE TIME_FORMAT_12 "%T". ::msgcat::mcset ga_IE DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):950
                                                                                      Entropy (8bit):4.037076523160125
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8LpP8ihyz/ptFOBViNef9kekIsnyFo0:46J0i0zRtUB0c9dkVneo0
                                                                                      MD5:B940E67011DDBAD6192E9182C5F0CCC0
                                                                                      SHA1:83A284899785956ECB015BBB871E7E04A7C36585
                                                                                      SHA-256:C71A07169CDBE9962616D28F38C32D641DA277E53E67F8E3A69EB320C1E2B88C
                                                                                      SHA-512:28570CB14452CA5285D97550EA77C9D8F71C57DE6C1D144ADB00B93712F588AF900DA32C10C3A81C7A2DEE11A3DC843780D24218F53920AB72E90321677CC9E8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset gl DAYS_OF_WEEK_ABBREV [list \. "Dom"\. "Lun"\. "Mar"\. "M\u00e9r"\. "Xov"\. "Ven"\. "S\u00e1b"]. ::msgcat::mcset gl DAYS_OF_WEEK_FULL [list \. "Domingo"\. "Luns"\. "Martes"\. "M\u00e9rcores"\. "Xoves"\. "Venres"\. "S\u00e1bado"]. ::msgcat::mcset gl MONTHS_ABBREV [list \. "Xan"\. "Feb"\. "Mar"\. "Abr"\. "Mai"\. "Xu\u00f1"\. "Xul"\. "Ago"\. "Set"\. "Out"\. "Nov"\. "Dec"\. ""]. ::msgcat::mcset gl MONTHS_FULL [list \. "Xaneiro"\. "Febreiro"\. "Marzo"\. "Abril"\. "Maio"\. "Xu\u00f1o"\. "Xullo"\. "Agosto"\. "Setembro"\. "Outubro"\. "Novembro"\. "Decembro"\. ""].}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.839318757139709
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoPhkgvNLoPxsF3v6aZoPhk9+3vR6HK:4EnLzu8NrvNEK3v6a2J3voq
                                                                                      MD5:3FCDF0FC39C8E34F6270A646A996F663
                                                                                      SHA1:6999E82148E1D1799C389BCC6C6952D5514F4A4B
                                                                                      SHA-256:BC2B0424CF27BEF67F309E2B6DFFEF4D39C46F15D91C15E83E070C7FD4E20C9C
                                                                                      SHA-512:CDB9ED694A7E555EB321F559E9B0CC0998FD526ADEF33AD08C56943033351D70900CD6EC62D380E23AB9F65CCFB85F4EEEB4E17FA8CC05E56C2AC57FBEDE721E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset gl_ES DATE_FORMAT "%d %B %Y". ::msgcat::mcset gl_ES TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset gl_ES DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1037
                                                                                      Entropy (8bit):4.13549698574103
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu81WjLHkFQSMnKIeCPHy3CAVfbku5SJ:460jwyLTySI4J
                                                                                      MD5:3350E1228CF7157ECE68762F967F2F32
                                                                                      SHA1:2D0411DA2F6E0441B1A8683687178E9EB552B835
                                                                                      SHA-256:75AA686FF901C9E66E51D36E8E78E5154B57EE9045784568F6A8798EA9689207
                                                                                      SHA-512:1D0B44F00A5E6D7B8CECB67EAF060C6053045610CF7246208C8E63E7271C7780587A184D38ECFDFDCFB976F9433FEFDA0BAF8981FCD197554D0874ED1E6B6428
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset gv DAYS_OF_WEEK_ABBREV [list \. "Jed"\. "Jel"\. "Jem"\. "Jerc"\. "Jerd"\. "Jeh"\. "Jes"]. ::msgcat::mcset gv DAYS_OF_WEEK_FULL [list \. "Jedoonee"\. "Jelhein"\. "Jemayrt"\. "Jercean"\. "Jerdein"\. "Jeheiney"\. "Jesarn"]. ::msgcat::mcset gv MONTHS_ABBREV [list \. "J-guer"\. "T-arree"\. "Mayrnt"\. "Avrril"\. "Boaldyn"\. "M-souree"\. "J-souree"\. "Luanistyn"\. "M-fouyir"\. "J-fouyir"\. "M.Houney"\. "M.Nollick"\. ""]. ::msgcat::mcset gv MONTHS_FULL [list \. "Jerrey-geuree"\. "Toshiaght-arree"\. "Mayrnt"\. "Averil"\. "Boaldyn"\. "Mean-souree"\. "Jerrey-souree"\. "Luanistyn"\. "Mean-fouyir"\. "Jerrey-fouyir"\. "Mee Houney"\.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.890913756172577
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoQbtvvNLoQLE3v6aZoQbto+3vR6HK:4EnLzu8CbtvvNBLE3v6avbtF3voq
                                                                                      MD5:A65040748621B18B1F88072883891280
                                                                                      SHA1:4D0ED6668A99BAC9B273B0FA8BC74EB6BB9DDFC8
                                                                                      SHA-256:823AF00F4E44613E929D32770EDB214132B6E210E872751624824DA5F0B78448
                                                                                      SHA-512:16FFD4107C3B85619629B2CD8A48AB9BC3763FA6E4FE4AE910EDF3B42209CEEB8358D4E7E531C2417875D05E5F801BB19B10130FA8BF70E44CFD8F1BA06F6B6E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset gv_GB DATE_FORMAT "%d %B %Y". ::msgcat::mcset gv_GB TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset gv_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1938
                                                                                      Entropy (8bit):4.234997703698801
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8Hdd4CLxLtmCLoCLHCL3CLXLICLP1ptzLzCJCLt5LL53h5Lq+p5LcL3pLzCt:4655ftB9hMcGlhO8/n/0ecOfC3
                                                                                      MD5:FFD5D8007D78770EA0E7E5643F1BD20A
                                                                                      SHA1:40854EB81EE670086D0D0C0C2F0F9D8406DF6B47
                                                                                      SHA-256:D27ADAF74EBB18D6964882CF931260331B93AE4B283427F9A0DB147A83DE1D55
                                                                                      SHA-512:EFBDADE1157C7E1CB8458CBA89913FB44DC2399AD860FCAEDA588B99230B0934EDAAF8BAB1742E03F06FA8047D3605E8D63BB23EC4B32155C256D07C46ABBFEE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset he DAYS_OF_WEEK_ABBREV [list \. "\u05d0"\. "\u05d1"\. "\u05d2"\. "\u05d3"\. "\u05d4"\. "\u05d5"\. "\u05e9"]. ::msgcat::mcset he DAYS_OF_WEEK_FULL [list \. "\u05d9\u05d5\u05dd \u05e8\u05d0\u05e9\u05d5\u05df"\. "\u05d9\u05d5\u05dd \u05e9\u05e0\u05d9"\. "\u05d9\u05d5\u05dd \u05e9\u05dc\u05d9\u05e9\u05d9"\. "\u05d9\u05d5\u05dd \u05e8\u05d1\u05d9\u05e2\u05d9"\. "\u05d9\u05d5\u05dd \u05d7\u05de\u05d9\u05e9\u05d9"\. "\u05d9\u05d5\u05dd \u05e9\u05d9\u05e9\u05d9"\. "\u05e9\u05d1\u05ea"]. ::msgcat::mcset he MONTHS_ABBREV [list \. "\u05d9\u05e0\u05d5"\. "\u05e4\u05d1\u05e8"\. "\u05de\u05e8\u05e5"\. "\u05d0\u05e4\u05e8"\. "\u05de\u05d0\u05d9"\. "\u05d9\u05d5\u05e0"\. "\u05d9\u05d5\u05dc"\. "\u05d0\u05d5\u05d2"\. "\u05e1\u05e4\u05d8"\.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1738
                                                                                      Entropy (8bit):4.1505681803025185
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8dVYe48VcOVcz1HtDVcqiVca4mGE18VcRBkEVcRfVcRMsVcqiVca4mGE18VI:465v4bNVO7GQbBkDuM4O7GQbBkDuh3x
                                                                                      MD5:349823390798DF68270E4DB46C3CA863
                                                                                      SHA1:814F9506FCD8B592C22A47023E73457C469B2F53
                                                                                      SHA-256:FAFE65DB09BDCB863742FDA8705BCD1C31B59E0DD8A3B347EA6DEC2596CEE0E9
                                                                                      SHA-512:4D12213EA9A3EAD6828E21D3B5B73931DC922EBE8FD2373E3A3E106DF1784E0BCE2C9D1FBEAE0D433449BE6D28A0F2F50F49AB8C208E69D413C6787ADF52915E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset hi DAYS_OF_WEEK_FULL [list \. "\u0930\u0935\u093f\u0935\u093e\u0930"\. "\u0938\u094b\u092e\u0935\u093e\u0930"\. "\u092e\u0902\u0917\u0932\u0935\u093e\u0930"\. "\u092c\u0941\u0927\u0935\u093e\u0930"\. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\. "\u0936\u0928\u093f\u0935\u093e\u0930"]. ::msgcat::mcset hi MONTHS_ABBREV [list \. "\u091c\u0928\u0935\u0930\u0940"\. "\u092b\u093c\u0930\u0935\u0930\u0940"\. "\u092e\u093e\u0930\u094d\u091a"\. "\u0905\u092a\u094d\u0930\u0947\u0932"\. "\u092e\u0908"\. "\u091c\u0942\u0928"\. "\u091c\u0941\u0932\u093e\u0908"\. "\u0905\u0917\u0938\u094d\u0924"\. "\u0938\u093f\u0924\u092e\u094d\u092c\u0930"\. "\u0905\u0915\u094d\u091f\u0942\u092c\u0930"\. "\u0928\u0935\u092e\u094d\u092c\u093
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.882853646266983
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmocv+9/Loz3v6rZoco+3v+6f6HK:4EnLzu8+vWq3v6rpF3vmq
                                                                                      MD5:BC86C58492BCB8828489B871D2A727F0
                                                                                      SHA1:22EEC74FC011063071A40C3860AE8EF38D898582
                                                                                      SHA-256:29C7CA358FFFCAF94753C7CC2F63B58386234B75552FA3272C2E36F253770C3F
                                                                                      SHA-512:ABFE093952144A285F7A86800F5933F7242CB224D917B4BAA4FD2CA48792BEFCBEE9AB7073472510B53D31083719EC68A77DD896410B3DC3C6E2CCD60C2E92F9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset hi_IN DATE_FORMAT "%d %M %Y". ::msgcat::mcset hi_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset hi_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1121
                                                                                      Entropy (8bit):4.291836444825864
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu84VBVgqoLpYDThoLZDT25KNWg1gqNvEKvOAl:46nNYPSLZP2ZVqJTO+
                                                                                      MD5:46FD3DF765F366C60B91FA0C4DE147DE
                                                                                      SHA1:5E006D1ACA7BBDAC9B8A65EFB26FAFC03C6E9FDE
                                                                                      SHA-256:9E14D8F7F54BE953983F198C8D59F38842C5F73419A5E81BE6460B3623E7307A
                                                                                      SHA-512:3AC26C55FB514D9EA46EF57582A2E0B64822E90C889F4B83A62EE255744FEBE0A012079DD764E0F6C7338B3580421C5B6C8575E0B85632015E3689CF58D9EB77
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset hr DAYS_OF_WEEK_ABBREV [list \. "ned"\. "pon"\. "uto"\. "sri"\. "\u010det"\. "pet"\. "sub"]. ::msgcat::mcset hr DAYS_OF_WEEK_FULL [list \. "nedjelja"\. "ponedjeljak"\. "utorak"\. "srijeda"\. "\u010detvrtak"\. "petak"\. "subota"]. ::msgcat::mcset hr MONTHS_ABBREV [list \. "sij"\. "vel"\. "o\u017eu"\. "tra"\. "svi"\. "lip"\. "srp"\. "kol"\. "ruj"\. "lis"\. "stu"\. "pro"\. ""]. ::msgcat::mcset hr MONTHS_FULL [list \. "sije\u010danj"\. "velja\u010da"\. "o\u017eujak"\. "travanj"\. "svibanj"\. "lipanj"\. "srpanj"\. "kolovoz"\. "rujan"\. "listopad"\. "studeni"\. "prosinac"\. ""]. ::msgcat::mcset hr DATE_FORMAT "
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1327
                                                                                      Entropy (8bit):4.447184847972284
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8Xjv5ZemNruwcVNtZHTE9wocxPvt9vq:46fBZemNqwIZHTEE3t5q
                                                                                      MD5:0561E62941F6ED8965DFC4E2B424E028
                                                                                      SHA1:C622B21C0DBA83F943FBD10C746E5FABE20235B2
                                                                                      SHA-256:314F4180C05DE4A4860F65AF6460900FFF77F12C08EDD728F68CA0065126B9AE
                                                                                      SHA-512:CAD01C963145463612BBAE4B9F5C80B83B228C0181C2500CE8CE1394E1A32CCA3587221F1406F6343029059F5AD47E8FD5514535DCEA45BBA6B2AE76993DFFBD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset hu DAYS_OF_WEEK_ABBREV [list \. "V"\. "H"\. "K"\. "Sze"\. "Cs"\. "P"\. "Szo"]. ::msgcat::mcset hu DAYS_OF_WEEK_FULL [list \. "vas\u00e1rnap"\. "h\u00e9tf\u0151"\. "kedd"\. "szerda"\. "cs\u00fct\u00f6rt\u00f6k"\. "p\u00e9ntek"\. "szombat"]. ::msgcat::mcset hu MONTHS_ABBREV [list \. "jan."\. "febr."\. "m\u00e1rc."\. "\u00e1pr."\. "m\u00e1j."\. "j\u00fan."\. "j\u00fal."\. "aug."\. "szept."\. "okt."\. "nov."\. "dec."\. ""]. ::msgcat::mcset hu MONTHS_FULL [list \. "janu\u00e1r"\. "febru\u00e1r"\. "m\u00e1rcius"\. "\u00e1prilis"\. "m\u00e1jus"\. "j\u00fanius"\. "j\u00falius"\. "augusztus"\. "szeptember"\. "okt\u00f3ber"\. "nove
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):914
                                                                                      Entropy (8bit):3.9322448438499125
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8acGEXctI9tdb/7579g6tdhUgQbVg:46GBEXKI9tdHtdwg
                                                                                      MD5:CE834C7E0C3170B733122FF8BF38C28D
                                                                                      SHA1:693ACC2A0972156B984106AFD07911AF14C4F19C
                                                                                      SHA-256:1F1B0F5DEDE0263BD81773A78E98AF551F36361ACCB315B618C8AE70A5FE781E
                                                                                      SHA-512:23BFC6E2CDB7BA75AAC3AA75869DF4A235E4526E8E83D73551B3BC2CE89F3675EBFA75BC94177F2C2BD6AC58C1B125BE65F8489BC4F85FA701415DB9768F7A80
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset id DAYS_OF_WEEK_ABBREV [list \. "Min"\. "Sen"\. "Sel"\. "Rab"\. "Kam"\. "Jum"\. "Sab"]. ::msgcat::mcset id DAYS_OF_WEEK_FULL [list \. "Minggu"\. "Senin"\. "Selasa"\. "Rabu"\. "Kamis"\. "Jumat"\. "Sabtu"]. ::msgcat::mcset id MONTHS_ABBREV [list \. "Jan"\. "Peb"\. "Mar"\. "Apr"\. "Mei"\. "Jun"\. "Jul"\. "Agu"\. "Sep"\. "Okt"\. "Nov"\. "Des"\. ""]. ::msgcat::mcset id MONTHS_FULL [list \. "Januari"\. "Pebruari"\. "Maret"\. "April"\. "Mei"\. "Juni"\. "Juli"\. "Agustus"\. "September"\. "Oktober"\. "November"\. "Desember"\. ""].}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.857986813915644
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmo0kGvNLo0F/W3v6aZo0kT+3vR6HK:4EnLzu8NGvNS3v6aQK3voq
                                                                                      MD5:A285817AAABD5203706D5F2A34158C03
                                                                                      SHA1:18FD0178051581C9F019604499BF91B16712CC91
                                                                                      SHA-256:DB81643BA1FD115E9D547943A889A56DFC0C81B63F21B1EDC1955C6884C1B2F5
                                                                                      SHA-512:0B6C684F2E5122681309A6212980C95C14172723F12D4864AF8A8A913DC7081BC42AC39CF087D29770B4A1F0B3B1F712856CBF05D1975FFFC008C16A91081A00
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset id_ID DATE_FORMAT "%d %B %Y". ::msgcat::mcset id_ID TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset id_ID DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1255
                                                                                      Entropy (8bit):4.391152464169964
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8qVXVDWpXMVmDz1ZVcWVzbQ1/xZ9b3eYXvhv3eT3:462hVW5JDz1ZVUbpfV83
                                                                                      MD5:6695839F1C4D2A92552CB1647FD14DA5
                                                                                      SHA1:04CB1976846A78EA9593CB3706C9D61173CE030C
                                                                                      SHA-256:6767115FFF2DA05F49A28BAD78853FAC6FC716186B985474D6D30764E1727C40
                                                                                      SHA-512:208766038A6A1D748F4CB2660F059AD355A5439EA6D8326F4F410B2DFBBDEECB55D4CE230C01C519B08CAB1CF5E5B3AC61E7BA86020A7BDA1AFEA624F3828521
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset is DAYS_OF_WEEK_ABBREV [list \. "sun."\. "m\u00e1n."\. "\u00feri."\. "mi\u00f0."\. "fim."\. "f\u00f6s."\. "lau."]. ::msgcat::mcset is DAYS_OF_WEEK_FULL [list \. "sunnudagur"\. "m\u00e1nudagur"\. "\u00feri\u00f0judagur"\. "mi\u00f0vikudagur"\. "fimmtudagur"\. "f\u00f6studagur"\. "laugardagur"]. ::msgcat::mcset is MONTHS_ABBREV [list \. "jan."\. "feb."\. "mar."\. "apr."\. "ma\u00ed"\. "j\u00fan."\. "j\u00fal."\. "\u00e1g\u00fa."\. "sep."\. "okt."\. "n\u00f3v."\. "des."\. ""]. ::msgcat::mcset is MONTHS_FULL [list \. "jan\u00faar"\. "febr\u00faar"\. "mars"\. "apr\u00edl"\. "ma\u00ed"\. "j\u00fan\u00ed"\. "j\u00fal\u00ed"\. "\u00e1g\u00fast"\.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1240
                                                                                      Entropy (8bit):4.207511774275323
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8iYJcc8jYShjLhQ6I3S68gvNvlNUhsFNlVGvNmv5svc:46Wi38jBJLhQ6I3EgFtNo4NlVGlw5Kc
                                                                                      MD5:8E205D032206D794A681E2A994532FA6
                                                                                      SHA1:47098672D339624474E8854EB0512D54A0CA49E7
                                                                                      SHA-256:C7D84001855586A0BAB236A6A5878922D9C4A2EA1799BF18544869359750C0DF
                                                                                      SHA-512:139219DBD014CCA15922C45C7A0468F62E864F18CC16C7B8506258D1ECD766E1EFF6EAE4DFDAF72898B9AF1A5E6CE8D7BB0F1A93A6604D2539F2645C9ED8D146
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset it DAYS_OF_WEEK_ABBREV [list \. "dom"\. "lun"\. "mar"\. "mer"\. "gio"\. "ven"\. "sab"]. ::msgcat::mcset it DAYS_OF_WEEK_FULL [list \. "domenica"\. "luned\u00ec"\. "marted\u00ec"\. "mercoled\u00ec"\. "gioved\u00ec"\. "venerd\u00ec"\. "sabato"]. ::msgcat::mcset it MONTHS_ABBREV [list \. "gen"\. "feb"\. "mar"\. "apr"\. "mag"\. "giu"\. "lug"\. "ago"\. "set"\. "ott"\. "nov"\. "dic"\. ""]. ::msgcat::mcset it MONTHS_FULL [list \. "gennaio"\. "febbraio"\. "marzo"\. "aprile"\. "maggio"\. "giugno"\. "luglio"\. "agosto"\. "settembre"\. "ottobre"\. "novembre"\. "dicembre"\. ""]. ::msgcat::mcset it BCE "aC". ::msgc
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):244
                                                                                      Entropy (8bit):4.851375233848049
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoi5jLWNLoyJ+3vULoia+3vjLtA6:4EnLzu8m3WNJ+3v23v3t3
                                                                                      MD5:8666E24230AED4DC76DB93BE1EA07FF6
                                                                                      SHA1:7C688C8693C76AEE07FB32637CD58E47A85760F3
                                                                                      SHA-256:2EE356FFA2491A5A60BDF7D7FEBFAC426824904738615A0C1D07AEF6BDA3B76F
                                                                                      SHA-512:BCCE87FB94B28B369B9EE48D792A399DB8250D0D3D73FC05D053276A7475229EF1555D5E516D780092496F0E5F229A9912A45FB5A88C024FCEBF08E654D37B07
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset it_CH DATE_FORMAT "%e. %B %Y". ::msgcat::mcset it_CH TIME_FORMAT "%H:%M:%S". ::msgcat::mcset it_CH DATE_TIME_FORMAT "%e. %B %Y %H:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1664
                                                                                      Entropy (8bit):4.88149888596689
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8VcQHxbtVLKMwvtFwvQv4fTweLvDvTwS0Zu+jqgv:46RbItt4mCEebzES0njqq
                                                                                      MD5:430DEB41034402906156D7E23971CD2C
                                                                                      SHA1:0952FFBD241B5111714275F5CD8FB5545067FFEC
                                                                                      SHA-256:38DCA9B656241884923C451A369B90A9F1D76F9029B2E98E04784323169C3251
                                                                                      SHA-512:AE5DF1B79AE34DF4CC1EB00406FFF49541A95E2C732E3041CCE321F2F3FA6461BB45C6524A5FEB77E18577206CBD88A83FBF20B4B058BAE9B889179C93221557
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ja DAYS_OF_WEEK_ABBREV [list \. "\u65e5"\. "\u6708"\. "\u706b"\. "\u6c34"\. "\u6728"\. "\u91d1"\. "\u571f"]. ::msgcat::mcset ja DAYS_OF_WEEK_FULL [list \. "\u65e5\u66dc\u65e5"\. "\u6708\u66dc\u65e5"\. "\u706b\u66dc\u65e5"\. "\u6c34\u66dc\u65e5"\. "\u6728\u66dc\u65e5"\. "\u91d1\u66dc\u65e5"\. "\u571f\u66dc\u65e5"]. ::msgcat::mcset ja MONTHS_FULL [list \. "1\u6708"\. "2\u6708"\. "3\u6708"\. "4\u6708"\. "5\u6708"\. "6\u6708"\. "7\u6708"\. "8\u6708"\. "9\u6708"\. "10\u6708"\. "11\u6708"\. "12\u6708"]. ::msgcat::mcset ja BCE "\u7d00\u5143\u524d". ::msgcat::mcset ja CE "\u897f\u66a6". ::msgcat::mcset ja AM "\u5348\u524d". ::msgcat::mcset ja PM "\u5348\u5f8c". ::msgcat::mcset ja DATE_FORMAT "%Y/%m/%
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):978
                                                                                      Entropy (8bit):4.013253613061898
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu83jGeo9sbjCjS3jCwjLj+zSsS9CfzTA2Qcl:46OOsJzTvl
                                                                                      MD5:AE55E001BBE3272CE13369C836139EF3
                                                                                      SHA1:D912A0AEBA08BC97D80E9B7A55CE146956C90BCC
                                                                                      SHA-256:1B00229DF5A979A040339BBC72D448F39968FEE5CC24F07241C9F6129A9B53DD
                                                                                      SHA-512:E53E8DB56AD367E832A121D637CA4755E6C8768C063E4BE43E6193C5F71ED7AA10F7223AC85750C0CAD543CF4A0BFE578CBA2877F176A5E58DCA2BAA2F7177FB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kl DAYS_OF_WEEK_ABBREV [list \. "sab"\. "ata"\. "mar"\. "pin"\. "sis"\. "tal"\. "arf"]. ::msgcat::mcset kl DAYS_OF_WEEK_FULL [list \. "sabaat"\. "ataasinngorneq"\. "marlunngorneq"\. "pingasunngorneq"\. "sisamanngorneq"\. "tallimanngorneq"\. "arfininngorneq"]. ::msgcat::mcset kl MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset kl MONTHS_FULL [list \. "januari"\. "februari"\. "martsi"\. "aprili"\. "maji"\. "juni"\. "juli"\. "augustusi"\. "septemberi"\. "oktoberi"\. "novemberi"\. "decemberi"\. ""].}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):279
                                                                                      Entropy (8bit):4.83493357349932
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoEpb53FD/LoEpLE3vG5oEpLE3v6X5oEpba+3vnFDoAov:4EnLzu8KF3FD/1w3vMw3v6T/3v9dy
                                                                                      MD5:4B8E5B6EB7C27A02DBC0C766479B068D
                                                                                      SHA1:E97A948FFE6C8DE99F91987155DF0A81A630950E
                                                                                      SHA-256:F99DA45138A8AEBFD92747FC28992F0C315C6C4AD97710EAF9427263BFFA139C
                                                                                      SHA-512:D726494A6F4E1FB8C71B8B56E9B735C1837D8D22828D006EF386E41AD15CD1E4CF14DAC01966B9AFE41F7B6A44916EFC730CF038B4EC393043AE9021D11DACF2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kl_GL DATE_FORMAT "%d %b %Y". ::msgcat::mcset kl_GL TIME_FORMAT "%T". ::msgcat::mcset kl_GL TIME_FORMAT_12 "%T". ::msgcat::mcset kl_GL DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1566
                                                                                      Entropy (8bit):4.552910804130986
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8cVBfHVnYgY+YGkYeY02Y7YkMXjDHMXjqKKyvtuvFd8vUPvwEq:46ojlmpYEY7XjDsXj+0t4zaU3wt
                                                                                      MD5:A4C37AF81FC4AA6003226A95539546C1
                                                                                      SHA1:A18A7361783896C691BD5BE8B3A1FCCCCB015F43
                                                                                      SHA-256:F6E2B0D116D2C9AC90DDA430B6892371D87A4ECFB6955318978ED6F6E9D546A6
                                                                                      SHA-512:FBE6BA258C250BD90FADCC42AC18A17CC4E7B040F160B94075AF1F42ECD43EEA6FE49DA52CF9B5BBB5D965D6AB7C4CC4053A78E865241F891E13F94EB20F0472
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ko DAYS_OF_WEEK_ABBREV [list \. "\uc77c"\. "\uc6d4"\. "\ud654"\. "\uc218"\. "\ubaa9"\. "\uae08"\. "\ud1a0"]. ::msgcat::mcset ko DAYS_OF_WEEK_FULL [list \. "\uc77c\uc694\uc77c"\. "\uc6d4\uc694\uc77c"\. "\ud654\uc694\uc77c"\. "\uc218\uc694\uc77c"\. "\ubaa9\uc694\uc77c"\. "\uae08\uc694\uc77c"\. "\ud1a0\uc694\uc77c"]. ::msgcat::mcset ko MONTHS_ABBREV [list \. "1\uc6d4"\. "2\uc6d4"\. "3\uc6d4"\. "4\uc6d4"\. "5\uc6d4"\. "6\uc6d4"\. "7\uc6d4"\. "8\uc6d4"\. "9\uc6d4"\. "10\uc6d4"\. "11\uc6d4"\. "12\uc6d4"\. ""]. ::msgcat::mcset ko MONTHS_FULL [list \. "1\uc6d4"\. "2\uc6d4"\. "3\uc6d4"\. "4\uc6d4"\. "5\uc6d4"\. "6\uc6d4"\. "7\uc6d4"\. "8\uc6d4"\.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):346
                                                                                      Entropy (8bit):5.015790750376121
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmo56SFZhjNo56m5Ybo56TGMZo56a/W3v6mfvLo56TT+3vOAEP:4EnLzu8r62vjs6m5YS6TGN6a+3v6o66J
                                                                                      MD5:9C7E97A55A957AB1D1B5E988AA514724
                                                                                      SHA1:592F8FF9FABBC7BF48539AF748DCFC9241AED82D
                                                                                      SHA-256:31A4B74F51C584354907251C55FE5CE894D2C9618156A1DC6F5A979BC350DB17
                                                                                      SHA-512:9D04DF2A87AFE24C339E1A0F6358FE995CBCAF8C7B08A1A7953675E2C2C1EDBCAF297B23C2B9BEC398DFEE6D1D75CE32E31389A7199466A38BC83C8DBBA67C77
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ko_KR BCE "\uae30\uc6d0\uc804". ::msgcat::mcset ko_KR CE "\uc11c\uae30". ::msgcat::mcset ko_KR DATE_FORMAT "%Y.%m.%d". ::msgcat::mcset ko_KR TIME_FORMAT_12 "%P %l:%M:%S". ::msgcat::mcset ko_KR DATE_TIME_FORMAT "%Y.%m.%d %P %l:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1958
                                                                                      Entropy (8bit):4.1451019501109965
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8Z448VcOVczWdSVcqVcR0q4vTqBBiXCVcqVcR0q4vTqBBiaMv:46u48h0qpBBaR0qpBBVu
                                                                                      MD5:E7938CB3AF53D42B4142CB104AB04B3B
                                                                                      SHA1:6205BD2336857F368CABF89647F54D94E093A77B
                                                                                      SHA-256:D236D5B27184B1E813E686D901418117F22D67024E6944018FC4B633DF9FF744
                                                                                      SHA-512:CE77CE2EC773F3A1A3CD68589C26F7089E8133ADE601CE899EEB0B13648051344A94E69AEC2C8C58349456E52B11EB7545C8926E3F08DB643EE551C641FF38DB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kok DAYS_OF_WEEK_FULL [list \. "\u0906\u0926\u093f\u0924\u094d\u092f\u0935\u093e\u0930"\. "\u0938\u094b\u092e\u0935\u093e\u0930"\. "\u092e\u0902\u0917\u0933\u093e\u0930"\. "\u092c\u0941\u0927\u0935\u093e\u0930"\. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\. "\u0936\u0928\u093f\u0935\u093e\u0930"]. ::msgcat::mcset kok MONTHS_ABBREV [list \. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\. "\u092e\u093e\u0930\u094d\u091a"\. "\u090f\u092a\u094d\u0930\u093f\u0932"\. "\u092e\u0947"\. "\u091c\u0942\u0928"\. "\u091c\u0941\u0932\u0948"\. "\u0913\u0917\u0938\u094d\u091f"\. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\. "\u0913\u0915\u094d\u091f\u094b\u092c\u0
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):254
                                                                                      Entropy (8bit):4.8580653411441155
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmo5VsNv+9/Lo5VsU3v6rZo5VsNo+3v+6f6HK:4EnLzu8rVsNvWiVsU3v6rAVsNF3vmq
                                                                                      MD5:A3B27D44ED430AEC7DF2A47C19659CC4
                                                                                      SHA1:700E4B9C395B540BFCE9ABDC81E6B9B758893DC9
                                                                                      SHA-256:BEE07F14C7F4FC93B62AC318F89D2ED0DD6FF30D2BF21C2874654FF0292A6C4B
                                                                                      SHA-512:79E9D8B817BDB6594A7C95991B2F6D7571D1C2976E74520D28223CF9F05EAA2128A44BC83A94089F09011FFCA9DB5E2D4DD74B59DE2BADC022E1571C595FE36C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kok_IN DATE_FORMAT "%d %M %Y". ::msgcat::mcset kok_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset kok_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):966
                                                                                      Entropy (8bit):3.9734955453120504
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu8z4md0eKwCW44mtls79cp32AqghoPx9ab43gWgw3SeWOdSyECYf5AQZ0eD:4azu806vCmgs7aB2seFkhq+9
                                                                                      MD5:413A264B40EEBEB28605481A3405D27D
                                                                                      SHA1:9C2EFA6326C62962DCD83BA8D16D89616D2C5B77
                                                                                      SHA-256:F49F4E1C7142BF7A82FC2B9FC075171AE45903FE69131478C15219D72BBAAD33
                                                                                      SHA-512:CF0559DB130B8070FEC93A64F5317A2C9CDE7D5EAFD1E92E76EAAE0740C6429B7AB7A60BD833CCA4ABCC0AADEBC6A68F854FF654E0707091023D275404172427
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kw DAYS_OF_WEEK_ABBREV [list \. "Sul"\. "Lun"\. "Mth"\. "Mhr"\. "Yow"\. "Gwe"\. "Sad"]. ::msgcat::mcset kw DAYS_OF_WEEK_FULL [list \. "De Sul"\. "De Lun"\. "De Merth"\. "De Merher"\. "De Yow"\. "De Gwener"\. "De Sadorn"]. ::msgcat::mcset kw MONTHS_ABBREV [list \. "Gen"\. "Whe"\. "Mer"\. "Ebr"\. "Me"\. "Evn"\. "Gor"\. "Est"\. "Gwn"\. "Hed"\. "Du"\. "Kev"\. ""]. ::msgcat::mcset kw MONTHS_FULL [list \. "Mys Genver"\. "Mys Whevrel"\. "Mys Merth"\. "Mys Ebrel"\. "Mys Me"\. "Mys Evan"\. "Mys Gortheren"\. "Mye Est"\. "Mys Gwyngala"\. "Mys Hedra"\. "Mys Du"\. "Mys Kevardhu"\. ""].}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.914818138642697
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoh6AvvNLoh633v6aZoh6Ao+3vR6HK:4EnLzu8z6AvvN6633v6aY6AF3voq
                                                                                      MD5:D325ADCF1F81F40D7B5D9754AE0542F3
                                                                                      SHA1:7A6BCD6BE5F41F84B600DF355CB00ECB9B4AE8C0
                                                                                      SHA-256:7A8A539C8B990AEFFEA06188B98DC437FD2A6E89FF66483EF334994E73FD0EC9
                                                                                      SHA-512:A05BBB3F80784B9C8BBA3FE618FEE154EE40D240ED4CFF7CD6EEE3D97BC4F065EFF585583123F1FFD8ABA1A194EB353229E15ED5CD43759D4D356EC5BE8DCD73
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset kw_GB DATE_FORMAT "%d %B %Y". ::msgcat::mcset kw_GB TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset kw_GB DATE_TIME_FORMAT "%d %B %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1255
                                                                                      Entropy (8bit):4.4416408590245
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8FHYI4/+HYZoNPW43VvJZb3lSuRnixx/x5JfbiMQeTVYkG2CvRksvQ:46hHNHhu43VxZb3lSuRwxZ5VbiMQeTVL
                                                                                      MD5:73F0A9C360A90CB75C6DA7EF87EF512F
                                                                                      SHA1:582EB224C9715C8336B4D1FCE7DDEC0D89F5AD71
                                                                                      SHA-256:510D8EED3040B50AFAF6A3C85BC98847F1B4D5D8A685C5EC06ACC2491B890101
                                                                                      SHA-512:B5482C7448BFC44B05FCF7EB0642B0C7393F4438082A507A94C13F56F12A115A5CE7F0744518BB0B2FAF759D1AD7744B0BEDB98F563C2A4AB11BC4619D7CEA22
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset lt DAYS_OF_WEEK_ABBREV [list \. "Sk"\. "Pr"\. "An"\. "Tr"\. "Kt"\. "Pn"\. "\u0160t"]. ::msgcat::mcset lt DAYS_OF_WEEK_FULL [list \. "Sekmadienis"\. "Pirmadienis"\. "Antradienis"\. "Tre\u010diadienis"\. "Ketvirtadienis"\. "Penktadienis"\. "\u0160e\u0161tadienis"]. ::msgcat::mcset lt MONTHS_ABBREV [list \. "Sau"\. "Vas"\. "Kov"\. "Bal"\. "Geg"\. "Bir"\. "Lie"\. "Rgp"\. "Rgs"\. "Spa"\. "Lap"\. "Grd"\. ""]. ::msgcat::mcset lt MONTHS_FULL [list \. "Sausio"\. "Vasario"\. "Kovo"\. "Baland\u017eio"\. "Gegu\u017e\u0117s"\. "Bir\u017eelio"\. "Liepos"\. "Rugpj\u016b\u010dio"\. "Rugs\u0117jo"\. "Spalio"\. "Lapkri\u010dio"\. "G
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1219
                                                                                      Entropy (8bit):4.39393801727056
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8lmZG0me3AEcGo49bJcpF9gT9PCbF5uld0vVcASAr8svJ5vk3:46TGAE8Q/PG5dv//Lk3
                                                                                      MD5:D5DEB8EFFE6298858F9D1B9FAD0EA525
                                                                                      SHA1:973DF40D0464BCE10EB5991806D9990B65AB0F82
                                                                                      SHA-256:FD95B38A3BEBD59468BDC2890BAC59DF31C352E17F2E77C82471E1CA89469802
                                                                                      SHA-512:F024E3D6D30E8E5C3316364A905C8CCAC87427BFC2EC10E72065F1DD114A112A61FDECDF1C4EC9C3D8BB9A54D18ED4AE9D57B07DA4AFFE480DE12F3D54BED928
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset lv DAYS_OF_WEEK_ABBREV [list \. "Sv"\. "P"\. "O"\. "T"\. "C"\. "Pk"\. "S"]. ::msgcat::mcset lv DAYS_OF_WEEK_FULL [list \. "sv\u0113tdiena"\. "pirmdiena"\. "otrdiena"\. "tre\u0161diena"\. "ceturdien"\. "piektdiena"\. "sestdiena"]. ::msgcat::mcset lv MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mar"\. "Apr"\. "Maijs"\. "J\u016bn"\. "J\u016bl"\. "Aug"\. "Sep"\. "Okt"\. "Nov"\. "Dec"\. ""]. ::msgcat::mcset lv MONTHS_FULL [list \. "janv\u0101ris"\. "febru\u0101ris"\. "marts"\. "apr\u012blis"\. "maijs"\. "j\u016bnijs"\. "j\u016blijs"\. "augusts"\. "septembris"\. "oktobris"\. "novembris"\. "decembris"\. ""]. ::msgcat
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2105
                                                                                      Entropy (8bit):4.237536682442766
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:46UcQdZnlcQfAQPWQEHKr9nGUeDjDpxpWQ1Q3QuQoQLX9TSQ2QIQPQHp7+8i:hNdR7cr9nMvXI0i7F89TSn1KX
                                                                                      MD5:CD589758D4F4B522781A10003D3E1791
                                                                                      SHA1:D953DD123D54B02BAF4B1AE0D36081CDFCA38444
                                                                                      SHA-256:F384DD88523147CEF42AA871D323FC4CBEE338FF67CC5C95AEC7940C0E531AE3
                                                                                      SHA-512:2EA1E71CD1E958F83277006343E85513D112CBB3C22CBFF29910CB1FC37F2389B3F1DCB2533EC59F9E642624869E5C61F289FDC010B55C6EECEF378F2D92DB0B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset mk DAYS_OF_WEEK_ABBREV [list \. "\u043d\u0435\u0434."\. "\u043f\u043e\u043d."\. "\u0432\u0442."\. "\u0441\u0440\u0435."\. "\u0447\u0435\u0442."\. "\u043f\u0435\u0442."\. "\u0441\u0430\u0431."]. ::msgcat::mcset mk DAYS_OF_WEEK_FULL [list \. "\u043d\u0435\u0434\u0435\u043b\u0430"\. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u043d\u0438\u043a"\. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\. "\u0441\u0440\u0435\u0434\u0430"\. "\u0447\u0435\u0442\u0432\u0440\u0442\u043e\u043a"\. "\u043f\u0435\u0442\u043e\u043a"\. "\u0441\u0430\u0431\u043e\u0442\u0430"]. ::msgcat::mcset mk MONTHS_ABBREV [list \. "\u0458\u0430\u043d."\. "\u0444\u0435\u0432."\. "\u043c\u0430\u0440."\. "\u0430\u043f\u0440."\. "\u043c\u0430\u0458."\. "\u0458\u0443\u043d."\. "\u0458\
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1807
                                                                                      Entropy (8bit):4.160320823510059
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8ocYe48VcOVczyVczoRSVcqVcR0q4vTqBBiPNVcqVcR0q4vTqBBil:46R48h0qpBBkI0qpBBe
                                                                                      MD5:791408BAE710B77A27AD664EC3325E1C
                                                                                      SHA1:E760B143A854838E18FFB66500F4D312DD80634E
                                                                                      SHA-256:EB2E2B7A41854AF68CEF5881CF1FBF4D38E70D2FAB2C3F3CE5901AA5CC56FC15
                                                                                      SHA-512:FE91EF67AB9313909FE0C29D5FBE2298EE35969A26A63D94A406BFDA7BCF932F2211F94C0E3C1D718DBC2D1145283C768C23487EEB253249ACFE76E8D1F1D1E5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset mr DAYS_OF_WEEK_FULL [list \. "\u0930\u0935\u093f\u0935\u093e\u0930"\. "\u0938\u094b\u092e\u0935\u093e\u0930"\. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\. "\u092e\u0902\u0917\u0933\u0935\u093e\u0930"\. "\u0917\u0941\u0930\u0941\u0935\u093e\u0930"\. "\u0936\u0941\u0915\u094d\u0930\u0935\u093e\u0930"\. "\u0936\u0928\u093f\u0935\u093e\u0930"]. ::msgcat::mcset mr MONTHS_ABBREV [list \. "\u091c\u093e\u0928\u0947\u0935\u093e\u0930\u0940"\. "\u092b\u0947\u092c\u0943\u0935\u093e\u0930\u0940"\. "\u092e\u093e\u0930\u094d\u091a"\. "\u090f\u092a\u094d\u0930\u093f\u0932"\. "\u092e\u0947"\. "\u091c\u0942\u0928"\. "\u091c\u0941\u0932\u0948"\. "\u0913\u0917\u0938\u094d\u091f"\. "\u0938\u0947\u092a\u094d\u091f\u0947\u0902\u092c\u0930"\. "\u0913\u0915\u094d\u091f\u094b\u092c\u0930"\.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.847742455062573
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoGNv+9/LoGU3v6rZoGNo+3v+6f6HK:4EnLzu8GvWe3v6r5F3vmq
                                                                                      MD5:899E845D33CAAFB6AD3B1F24B3F92843
                                                                                      SHA1:FC17A6742BF87E81BBD4D5CB7B4DCED0D4DD657B
                                                                                      SHA-256:F75A29BB323DB4354B0C759CB1C8C5A4FFC376DFFD74274CA60A36994816A75C
                                                                                      SHA-512:99D05FCE8A9C9BE06FDA8B54D4DE5497141F6373F470B2AB24C2D00B9C56031350F5DCDA2283A0E6F5B09FF21218FC3C7E2A6AB8ECC5BB020546FD62BDC8FF99
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset mr_IN DATE_FORMAT "%d %M %Y". ::msgcat::mcset mr_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset mr_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):910
                                                                                      Entropy (8bit):3.9292866027924838
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu82mCBuvFYcEfmt1qWjefjESRsToOqrlHvFguSixTRs1OAfC67:4azu82nBuHEfKxjeby7cl9gbZUAfCc
                                                                                      MD5:441CC737D383D8213F64B62A5DBEEC3E
                                                                                      SHA1:34FBE99FB25A0DCA2FDA2C008AC8127BA2BC273B
                                                                                      SHA-256:831F611EE851A64BF1BA5F9A5441EC1D50722FA9F15B4227707FE1927F754DE4
                                                                                      SHA-512:0474B2127890F63814CD9E77D156B5E4FC45EB3C17A57719B672AC9E3A6EEA9934F0BE158F76808B34A11DA844AB900652C18E512830278DFED2666CD005FBE5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ms DAYS_OF_WEEK_ABBREV [list \. "Aha"\. "Isn"\. "Sei"\. "Rab"\. "Kha"\. "Jum"\. "Sab"]. ::msgcat::mcset ms DAYS_OF_WEEK_FULL [list \. "Ahad"\. "Isnin"\. "Selasa"\. "Rahu"\. "Khamis"\. "Jumaat"\. "Sabtu"]. ::msgcat::mcset ms MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mac"\. "Apr"\. "Mei"\. "Jun"\. "Jul"\. "Ogos"\. "Sep"\. "Okt"\. "Nov"\. "Dis"\. ""]. ::msgcat::mcset ms MONTHS_FULL [list \. "Januari"\. "Februari"\. "Mac"\. "April"\. "Mei"\. "Jun"\. "Julai"\. "Ogos"\. "September"\. "Oktober"\. "November"\. "Disember"\. ""].}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):259
                                                                                      Entropy (8bit):4.770028367699931
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoChFflD/LoChF+3v6xH5oCh++3vflm6PYv:4EnLzu8IPflD/ne3v6Tl3vflm6q
                                                                                      MD5:8261689A45FB754158B10B044BDC4965
                                                                                      SHA1:6FFC9B16A0600D9BC457322F1316BC175309C6CA
                                                                                      SHA-256:D05948D75C06669ADDB9708BC5FB48E6B651D4E62EF1B327EF8A3F605FD5271C
                                                                                      SHA-512:0321A5C17B3E33FDE9480AC6014B373D1663219D0069388920D277AA61341B8293883517C900030177FF82D65340E6C9E3ED051B27708DD093055E3BE64B2AF3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ms_MY DATE_FORMAT "%A %d %b %Y". ::msgcat::mcset ms_MY TIME_FORMAT_12 "%I:%M:%S %z". ::msgcat::mcset ms_MY DATE_TIME_FORMAT "%A %d %b %Y %I:%M:%S %z %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):690
                                                                                      Entropy (8bit):4.48913642143724
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu8+YmWjjRgWfjxBTo4erxy1IGZzNN+3v6amK3vZsq:4azu8+YZjjRXbfNedy1IG5N6vjmsvGq
                                                                                      MD5:CE7E67A03ED8C3297C6A5B634B55D144
                                                                                      SHA1:3DA5ACC0F52518541810E7F2FE57751955E12BDA
                                                                                      SHA-256:D115718818E3E3367847CE35BB5FF0361D08993D9749D438C918F8EB87AD8814
                                                                                      SHA-512:3754AA7B7D27A813C6113D2AA834A951FED1B81E4DACE22C81E0583F29BBC73C014697F39A2067DEC622D98EACD70D26FD40F80CF6D09E1C949F01FADED52C74
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset mt DAYS_OF_WEEK_ABBREV [list \. "\u0126ad"\. "Tne"\. "Tli"\. "Erb"\. "\u0126am"\. "\u0120im"]. ::msgcat::mcset mt MONTHS_ABBREV [list \. "Jan"\. "Fra"\. "Mar"\. "Apr"\. "Mej"\. "\u0120un"\. "Lul"\. "Awi"\. "Set"\. "Ott"\. "Nov"]. ::msgcat::mcset mt BCE "QK". ::msgcat::mcset mt CE "". ::msgcat::mcset mt DATE_FORMAT "%A, %e ta %B, %Y". ::msgcat::mcset mt TIME_FORMAT_12 "%l:%M:%S %P". ::msgcat::mcset mt DATE_TIME_FORMAT "%A, %e ta %B, %Y %l:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1157
                                                                                      Entropy (8bit):4.24006506188001
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8CKEj4/xasSpfiTBtHQT1V/W3WNfvZv3l:46KU/0s2iTeVOiHN1
                                                                                      MD5:D5509ABF5CBFB485C20A26FCC6B1783E
                                                                                      SHA1:53A298FBBF09AE2E223B041786443A3D8688C9EB
                                                                                      SHA-256:BC401889DD934C49D10D99B471441BE2B536B1722739C7B0AB7DE7629680F602
                                                                                      SHA-512:BDAFBA46EF44151CFD9EF7BC1909210F6DB2BAC20C31ED21AE3BE7EAC785CD4F545C4590CF551C0D066F982E2050F5844BDDC569F32C5804DBDE657F4511A6FE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset nb DAYS_OF_WEEK_ABBREV [list \. "s\u00f8"\. "ma"\. "ti"\. "on"\. "to"\. "fr"\. "l\u00f8"]. ::msgcat::mcset nb DAYS_OF_WEEK_FULL [list \. "s\u00f8ndag"\. "mandag"\. "tirsdag"\. "onsdag"\. "torsdag"\. "fredag"\. "l\u00f8rdag"]. ::msgcat::mcset nb MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "mai"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "des"\. ""]. ::msgcat::mcset nb MONTHS_FULL [list \. "januar"\. "februar"\. "mars"\. "april"\. "mai"\. "juni"\. "juli"\. "august"\. "september"\. "oktober"\. "november"\. "desember"\. ""]. ::msgcat::mcset nb BCE "f.Kr.". ::msgcat::mcset nb CE "e.Kr.".
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1079
                                                                                      Entropy (8bit):4.158523842311663
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu84LFiS8LMKZoNfSZTNTQhFCNZvtWvg:46Oi5LMKZASZTEF2Ntgg
                                                                                      MD5:98820DFF7E1C8A9EAB8C74B0B25DEB5D
                                                                                      SHA1:5357063D5699188E544D244EC4AEFDDF7606B922
                                                                                      SHA-256:49128B36B88E380188059C4B593C317382F32E29D1ADC18D58D14D142459A2BB
                                                                                      SHA-512:26AB945B7BA00433BEC85ACC1D90D1D3B70CE505976CABE1D75A7134E00CD591AC27463987C515EEA079969DBCF200DA9C8538CAAF178A1EE17C9B0284260C45
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset nl DAYS_OF_WEEK_ABBREV [list \. "zo"\. "ma"\. "di"\. "wo"\. "do"\. "vr"\. "za"]. ::msgcat::mcset nl DAYS_OF_WEEK_FULL [list \. "zondag"\. "maandag"\. "dinsdag"\. "woensdag"\. "donderdag"\. "vrijdag"\. "zaterdag"]. ::msgcat::mcset nl MONTHS_ABBREV [list \. "jan"\. "feb"\. "mrt"\. "apr"\. "mei"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset nl MONTHS_FULL [list \. "januari"\. "februari"\. "maart"\. "april"\. "mei"\. "juni"\. "juli"\. "augustus"\. "september"\. "oktober"\. "november"\. "december"\. ""]. ::msgcat::mcset nl DATE_FORMAT "%e %B %Y". ::msgcat::mcset nl TIME_FORM
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):279
                                                                                      Entropy (8bit):4.817188474504631
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmo4gPI5og9X3vG5og9X3v6X5o49+3vnFDoAov:4EnLzu8WgAhF3v8F3v6JI3v9dy
                                                                                      MD5:B08E30850CA849068D06A99B4E216892
                                                                                      SHA1:11B5E95FF4D822E76A1B9C28EEC2BC5E95E5E362
                                                                                      SHA-256:9CD54EC24CBDBEC5E4FE543DDA8CA95390678D432D33201FA1C32B61F8FE225A
                                                                                      SHA-512:9AF147C2F22B11115E32E0BFD0126FE7668328E7C67B349A781F42B0022A334E53DDF3FCCC2C34C91BFBB45602A002D0D7B569B5E1FE9F0EE6C4570400CB0B0C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset nl_BE DATE_FORMAT "%d-%m-%y". ::msgcat::mcset nl_BE TIME_FORMAT "%T". ::msgcat::mcset nl_BE TIME_FORMAT_12 "%T". ::msgcat::mcset nl_BE DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1148
                                                                                      Entropy (8bit):4.207752506572597
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8eNsP2/xhsSpf2TBtHQT15j63WN7v9v3l:46it/vs22Te5OiL51
                                                                                      MD5:2266607EF358B632696C7164E61358B5
                                                                                      SHA1:A380863A8320DAB1D5A2D60C22ED5F7DB5C7BAF7
                                                                                      SHA-256:5EE93A8C245722DEB64B68EFF50C081F24DA5DE43D999C006A10C484E1D3B4ED
                                                                                      SHA-512:2A8DEF754A25736D14B958D8B0CEA0DC41C402A9EFA25C9500BA861A7E8D74C79939C1969AC694245605C17D33AD3984F6B9ACCA4BE03EFC41A878772BB5FD86
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset nn DAYS_OF_WEEK_ABBREV [list \. "su"\. "m\u00e5"\. "ty"\. "on"\. "to"\. "fr"\. "lau"]. ::msgcat::mcset nn DAYS_OF_WEEK_FULL [list \. "sundag"\. "m\u00e5ndag"\. "tysdag"\. "onsdag"\. "torsdag"\. "fredag"\. "laurdag"]. ::msgcat::mcset nn MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "mai"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "des"\. ""]. ::msgcat::mcset nn MONTHS_FULL [list \. "januar"\. "februar"\. "mars"\. "april"\. "mai"\. "juni"\. "juli"\. "august"\. "september"\. "oktober"\. "november"\. "desember"\. ""]. ::msgcat::mcset nn BCE "f.Kr.". ::msgcat::mcset nn CE "e.Kr.". ::msgca
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1211
                                                                                      Entropy (8bit):4.392723231340452
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu854moKR4mtPoTckd8EnO6z3K4jwxI1LRhtm3ni8FwxIBgdE4RsMZmB0CLs:4azu8yNgyJxPEyRhonO+AjTg0Okvpvn
                                                                                      MD5:31A9133E9DCA7751B4C3451D60CCFFA0
                                                                                      SHA1:FB97A5830965716E77563BE6B7EB1C6A0EA6BF40
                                                                                      SHA-256:C39595DDC0095EB4AE9E66DB02EE175B31AC3DA1F649EB88FA61B911F838F753
                                                                                      SHA-512:329EE7FE79783C83361A0C5FFFD7766B64B8544D1AD63C57AEAA2CC6A526E01D9C4D7765C73E88F86DAE57477459EA330A0C42F39E441B50DE9B0F429D01EAE8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset pl DAYS_OF_WEEK_ABBREV [list \. "N"\. "Pn"\. "Wt"\. "\u015ar"\. "Cz"\. "Pt"\. "So"]. ::msgcat::mcset pl DAYS_OF_WEEK_FULL [list \. "niedziela"\. "poniedzia\u0142ek"\. "wtorek"\. "\u015broda"\. "czwartek"\. "pi\u0105tek"\. "sobota"]. ::msgcat::mcset pl MONTHS_ABBREV [list \. "sty"\. "lut"\. "mar"\. "kwi"\. "maj"\. "cze"\. "lip"\. "sie"\. "wrz"\. "pa\u017a"\. "lis"\. "gru"\. ""]. ::msgcat::mcset pl MONTHS_FULL [list \. "stycze\u0144"\. "luty"\. "marzec"\. "kwiecie\u0144"\. "maj"\. "czerwiec"\. "lipiec"\. "sierpie\u0144"\. "wrzesie\u0144"\. "pa\u017adziernik"\. "listopad"\. "grudzie\u0144"\. ""]. ::msgcat::m
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1127
                                                                                      Entropy (8bit):4.325163993882846
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8pYpzzktTYyUgC0CIKjblie5f9kwAAs+CFsFoD6GADvtU6svO:46dCzWTh2AA9/2F4oD6GAztU6KO
                                                                                      MD5:D827F76D1ED6CB89839CAC2B56FD7252
                                                                                      SHA1:140D6BC1F6CEF5FD0A390B3842053BF54B54B4E2
                                                                                      SHA-256:9F2BFFA3B4D8783B2CFB2CED9CC4319ACF06988F61829A1E5291D55B19854E88
                                                                                      SHA-512:B662336699E23E371F0148EDD742F71874A7A28DFA81F0AFAE91C8C9494CEA1904FEA0C21264CF2A253E0FB1360AD35B28CFC4B74E4D7B2DBB0E453E96F7EB93
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset pt DAYS_OF_WEEK_ABBREV [list \. "Dom"\. "Seg"\. "Ter"\. "Qua"\. "Qui"\. "Sex"\. "S\u00e1b"]. ::msgcat::mcset pt DAYS_OF_WEEK_FULL [list \. "Domingo"\. "Segunda-feira"\. "Ter\u00e7a-feira"\. "Quarta-feira"\. "Quinta-feira"\. "Sexta-feira"\. "S\u00e1bado"]. ::msgcat::mcset pt MONTHS_ABBREV [list \. "Jan"\. "Fev"\. "Mar"\. "Abr"\. "Mai"\. "Jun"\. "Jul"\. "Ago"\. "Set"\. "Out"\. "Nov"\. "Dez"\. ""]. ::msgcat::mcset pt MONTHS_FULL [list \. "Janeiro"\. "Fevereiro"\. "Mar\u00e7o"\. "Abril"\. "Maio"\. "Junho"\. "Julho"\. "Agosto"\. "Setembro"\. "Outubro"\. "Novembro"\. "Dezembro"\. ""]. ::msgcat::mcset pt DATE_FO
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):279
                                                                                      Entropy (8bit):4.8127929329126085
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmofm6GPWHFLofAW3vG5ofAW3v6X5ofm6T+3vnFDoAov:4EnLzu8hNGgF493vr93v6uNK3v9dy
                                                                                      MD5:4EE34960147173A12020A583340E92F8
                                                                                      SHA1:78D91A80E2426A84BC88EE97DA28EC0E4BE8DE45
                                                                                      SHA-256:E383B20484EE90C00054D52DD5AF473B2AC9DC50C14D459A579EF5F44271D256
                                                                                      SHA-512:EDFF8FB9A86731FFF005AFBBBB522F69B2C6033F59ECCD5E35A8B6A9E0F9AF23C52FFDCC22D893915AD1854E8104C81DA8C5BD8C794C7E645AFB82001B4BFC24
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset pt_BR DATE_FORMAT "%d-%m-%Y". ::msgcat::mcset pt_BR TIME_FORMAT "%T". ::msgcat::mcset pt_BR TIME_FORMAT_12 "%T". ::msgcat::mcset pt_BR DATE_TIME_FORMAT "%a %d %b %Y %T %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1172
                                                                                      Entropy (8bit):4.279005910896047
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8/0oFUBZNk1Mkp3pFukZEoVYfPcF+T1vWFMvUvWI3:46kNkKkpLEoSfPcFgvWFqSWI3
                                                                                      MD5:0F5C8A7022DB1203442241ABEB5901FF
                                                                                      SHA1:C54C8BF05E8E6C2C0901D3C88C89DDCF35A26924
                                                                                      SHA-256:D2E14BE188350D343927D5380EB5672039FE9A37E9A9957921B40E4619B36027
                                                                                      SHA-512:13ACF499FA803D4446D8EC67119BC8257B1F093084B83D854643CEA918049F96C8FA08DC5F896EECA80A5FD552D90E5079937B1A3894D89A589E468172856163
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ro DAYS_OF_WEEK_ABBREV [list \. "D"\. "L"\. "Ma"\. "Mi"\. "J"\. "V"\. "S"]. ::msgcat::mcset ro DAYS_OF_WEEK_FULL [list \. "duminic\u0103"\. "luni"\. "mar\u0163i"\. "miercuri"\. "joi"\. "vineri"\. "s\u00eemb\u0103t\u0103"]. ::msgcat::mcset ro MONTHS_ABBREV [list \. "Ian"\. "Feb"\. "Mar"\. "Apr"\. "Mai"\. "Iun"\. "Iul"\. "Aug"\. "Sep"\. "Oct"\. "Nov"\. "Dec"\. ""]. ::msgcat::mcset ro MONTHS_FULL [list \. "ianuarie"\. "februarie"\. "martie"\. "aprilie"\. "mai"\. "iunie"\. "iulie"\. "august"\. "septembrie"\. "octombrie"\. "noiembrie"\. "decembrie"\. ""]. ::msgcat::mcset ro BCE "d.C.". ::msgcat::mcset ro CE
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2039
                                                                                      Entropy (8bit):4.225775794669275
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:46CpQ7kvicQfAQPlQoBBCZAitBmZ/QhQoQaQPTeQgQonQ4FQEWFkt3Wd:hCpgkvzRo6QBw53weFHXFgIGd
                                                                                      MD5:3A7181CE08259FF19D2C27CF8C6752B3
                                                                                      SHA1:97DFFB1E224CEDB5427841C3B59F85376CD4423B
                                                                                      SHA-256:C2A3A0BE5BC5A46A6A63C4DE34E317B402BAD40C22FB2936E1A4F53C1E2F625F
                                                                                      SHA-512:CC9620BA4601E53B22CCFC66A0B53C26224158379DF6BA2D4704A2FE11222DFBDAE3CA9CF51576B4084B8CCA8DB13FDE81396E38F94BCD0C8EA21C5D77680394
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ru DAYS_OF_WEEK_ABBREV [list \. "\u0412\u0441"\. "\u041f\u043d"\. "\u0412\u0442"\. "\u0421\u0440"\. "\u0427\u0442"\. "\u041f\u0442"\. "\u0421\u0431"]. ::msgcat::mcset ru DAYS_OF_WEEK_FULL [list \. "\u0432\u043e\u0441\u043a\u0440\u0435\u0441\u0435\u043d\u044c\u0435"\. "\u043f\u043e\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u0438\u043a"\. "\u0432\u0442\u043e\u0440\u043d\u0438\u043a"\. "\u0441\u0440\u0435\u0434\u0430"\. "\u0447\u0435\u0442\u0432\u0435\u0440\u0433"\. "\u043f\u044f\u0442\u043d\u0438\u0446\u0430"\. "\u0441\u0443\u0431\u0431\u043e\u0442\u0430"]. ::msgcat::mcset ru MONTHS_ABBREV [list \. "\u044f\u043d\u0432"\. "\u0444\u0435\u0432"\. "\u043c\u0430\u0440"\. "\u0430\u043f\u0440"\. "\u043c\u0430\u0439"\. "\u0438\u044e\u043d"\. "\u0438\u
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):242
                                                                                      Entropy (8bit):4.8961185447535
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoVAgWFLoVY9X3vtfNrFLoVA9+3vW6Q9:4EnLzu8DFWFgaX3vtNS/3vWH9
                                                                                      MD5:E719F47462123A8E7DABADD2D362B4D8
                                                                                      SHA1:332E4CC96E7A01DA7FB399EA14770A5C5185B9F2
                                                                                      SHA-256:AE5D3DF23F019455F3EDFC3262AAC2B00098881F09B9A934C0D26C0AB896700C
                                                                                      SHA-512:93C19D51B633A118AB0D172C5A0991E5084BD54B2E61469D800F80B251A57BD1392BA66FD627586E75B1B075A7C9C2C667654F5783C423819FBDEA640A210BFA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ru_UA DATE_FORMAT "%d.%m.%Y". ::msgcat::mcset ru_UA TIME_FORMAT "%k:%M:%S". ::msgcat::mcset ru_UA DATE_TIME_FORMAT "%d.%m.%Y %k:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1160
                                                                                      Entropy (8bit):4.287536872407747
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8YYy/FY+Cnwj4EbJK5O9g+tQhgQmy/L6GWGvtlMsvWT9:46al4ETw/rWQtVWh
                                                                                      MD5:C7BBD44BD3C30C6116A15C77B15F8E79
                                                                                      SHA1:37CD1477A3318838E8D5C93D596A23F99C8409F2
                                                                                      SHA-256:00F119701C9F3EBA273701A6A731ADAFD7B8902F6BCCF34E61308984456E193A
                                                                                      SHA-512:DAFBDA53CF6AD57A4F6A078E9EF8ED3CACF2F8809DC2AEFB812A4C3ACCD51D954C52079FA26828D670BF696E14989D3FE3C249F1E612B7C759770378919D8BBC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sh DAYS_OF_WEEK_ABBREV [list \. "Ned"\. "Pon"\. "Uto"\. "Sre"\. "\u010cet"\. "Pet"\. "Sub"]. ::msgcat::mcset sh DAYS_OF_WEEK_FULL [list \. "Nedelja"\. "Ponedeljak"\. "Utorak"\. "Sreda"\. "\u010cetvrtak"\. "Petak"\. "Subota"]. ::msgcat::mcset sh MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mar"\. "Apr"\. "Maj"\. "Jun"\. "Jul"\. "Avg"\. "Sep"\. "Okt"\. "Nov"\. "Dec"\. ""]. ::msgcat::mcset sh MONTHS_FULL [list \. "Januar"\. "Februar"\. "Mart"\. "April"\. "Maj"\. "Juni"\. "Juli"\. "Avgust"\. "Septembar"\. "Oktobar"\. "Novembar"\. "Decembar"\. ""]. ::msgcat::mcset sh BCE "p. n. e.". ::msgcat::mcset sh CE "n. e."
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1203
                                                                                      Entropy (8bit):4.335103779497533
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu834j4PV3sSAT3fk3TEJbAT3T1cPyF3eYuCvte/v3eG:46TUG3sPk3TEkcPyFpuEtenJ
                                                                                      MD5:B2EF88014D274C8001B36739F5F566CE
                                                                                      SHA1:1044145C1714FD44D008B13A31BC778DFBE47950
                                                                                      SHA-256:043DECE6EA7C83956B3300B95F8A0E92BADAA8FC29D6C510706649D1D810679A
                                                                                      SHA-512:820EB42D94BEE21FDB990FC27F7900CF676AFC59520F3EE78FB72D6D7243A17A234D4AE964E5D52AD7CBC7DD9A593F672BAD8A80EC48B25B344AA6950EF52ECF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sk DAYS_OF_WEEK_ABBREV [list \. "Ne"\. "Po"\. "Ut"\. "St"\. "\u0160t"\. "Pa"\. "So"]. ::msgcat::mcset sk DAYS_OF_WEEK_FULL [list \. "Nede\u013ee"\. "Pondelok"\. "Utorok"\. "Streda"\. "\u0160tvrtok"\. "Piatok"\. "Sobota"]. ::msgcat::mcset sk MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "m\u00e1j"\. "j\u00fan"\. "j\u00fal"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset sk MONTHS_FULL [list \. "janu\u00e1r"\. "febru\u00e1r"\. "marec"\. "apr\u00edl"\. "m\u00e1j"\. "j\u00fan"\. "j\u00fal"\. "august"\. "september"\. "okt\u00f3ber"\. "november"\. "december"\. ""]. ::msgcat::mcset sk BCE
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1164
                                                                                      Entropy (8bit):4.26110325084843
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8PyUpd4+RfscasS9CErTByism1KSCvt1vJo6:462U/ENsqrTtVEtRx
                                                                                      MD5:2566BDE28B17C526227634F1B4FC7047
                                                                                      SHA1:BE6940EC9F4C5E228F043F9D46A42234A02F4A03
                                                                                      SHA-256:BD488C9D791ABEDF698B66B768E2BF24251FFEAF06F53FB3746CAB457710FF77
                                                                                      SHA-512:CC684BFC82CA55240C5B542F3F63E0FF43AEF958469B3978E414261BC4FADB50A0AE3554CF2468AC88E4DDB70D2258296C0A2FBB69312223EED56C7C03FEC17C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sl DAYS_OF_WEEK_ABBREV [list \. "Ned"\. "Pon"\. "Tor"\. "Sre"\. "\u010cet"\. "Pet"\. "Sob"]. ::msgcat::mcset sl DAYS_OF_WEEK_FULL [list \. "Nedelja"\. "Ponedeljek"\. "Torek"\. "Sreda"\. "\u010cetrtek"\. "Petek"\. "Sobota"]. ::msgcat::mcset sl MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "avg"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset sl MONTHS_FULL [list \. "januar"\. "februar"\. "marec"\. "april"\. "maj"\. "junij"\. "julij"\. "avgust"\. "september"\. "oktober"\. "november"\. "december"\. ""]. ::msgcat::mcset sl BCE "pr.n.\u0161.". ::msgcat::mcset sl CE "p
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1267
                                                                                      Entropy (8bit):4.339253133089184
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu82qJw7W5wO6jwbNU7FtHhoJCLov4v2:46iWrvGtBo6+O2
                                                                                      MD5:931A009F7E8A376972DE22AD5670EC88
                                                                                      SHA1:44AEF01F568250851099BAA8A536FBBACD3DEBBB
                                                                                      SHA-256:CB27007E138315B064576C17931280CFE6E6929EFC3DAFD7171713D204CFC3BF
                                                                                      SHA-512:47B230271CD362990C581CD6C06B0BCEA23E10E03D927C7C28415739DB3541D69D1B87DF554E9B4F00ECCAAB0F6AC0565F9EB0DEA8B75C54A90B2D53C928D379
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sq DAYS_OF_WEEK_ABBREV [list \. "Die"\. "H\u00ebn"\. "Mar"\. "M\u00ebr"\. "Enj"\. "Pre"\. "Sht"]. ::msgcat::mcset sq DAYS_OF_WEEK_FULL [list \. "e diel"\. "e h\u00ebn\u00eb"\. "e mart\u00eb"\. "e m\u00ebrkur\u00eb"\. "e enjte"\. "e premte"\. "e shtun\u00eb"]. ::msgcat::mcset sq MONTHS_ABBREV [list \. "Jan"\. "Shk"\. "Mar"\. "Pri"\. "Maj"\. "Qer"\. "Kor"\. "Gsh"\. "Sht"\. "Tet"\. "N\u00ebn"\. "Dhj"\. ""]. ::msgcat::mcset sq MONTHS_FULL [list \. "janar"\. "shkurt"\. "mars"\. "prill"\. "maj"\. "qershor"\. "korrik"\. "gusht"\. "shtator"\. "tetor"\. "n\u00ebntor"\. "dhjetor"\. ""]. ::msgcat::mcset sq BCE "p.e.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2035
                                                                                      Entropy (8bit):4.24530896413441
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:46qoQCSdQqQP4QSsIVKP10NupiuQxQaQLlKnM28nGtfR:hjIX15VKP6NmBU3YKnFbp
                                                                                      MD5:5CA16D93718AAA813ADE746440CF5CE6
                                                                                      SHA1:A142733052B87CA510B8945256399CE9F873794C
                                                                                      SHA-256:313E8CDBBC0288AED922B9927A7331D0FAA2E451D4174B1F5B76C5C9FAEC8F9B
                                                                                      SHA-512:4D031F9BA75D45EC89B2C74A870CCDA41587650D7F9BC91395F68B70BA3CD7A7105E70C19D139D20096533E06F5787C00EA850E27C4ADCF5A28572480D39B639
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sr DAYS_OF_WEEK_ABBREV [list \. "\u041d\u0435\u0434"\. "\u041f\u043e\u043d"\. "\u0423\u0442\u043e"\. "\u0421\u0440\u0435"\. "\u0427\u0435\u0442"\. "\u041f\u0435\u0442"\. "\u0421\u0443\u0431"]. ::msgcat::mcset sr DAYS_OF_WEEK_FULL [list \. "\u041d\u0435\u0434\u0435\u0459\u0430"\. "\u041f\u043e\u043d\u0435\u0434\u0435\u0459\u0430\u043a"\. "\u0423\u0442\u043e\u0440\u0430\u043a"\. "\u0421\u0440\u0435\u0434\u0430"\. "\u0427\u0435\u0442\u0432\u0440\u0442\u0430\u043a"\. "\u041f\u0435\u0442\u0430\u043a"\. "\u0421\u0443\u0431\u043e\u0442\u0430"]. ::msgcat::mcset sr MONTHS_ABBREV [list \. "\u0408\u0430\u043d"\. "\u0424\u0435\u0431"\. "\u041c\u0430\u0440"\. "\u0410\u043f\u0440"\. "\u041c\u0430\u0458"\. "\u0408\u0443\u043d"\. "\u0408\u0443\u043b"\.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1167
                                                                                      Entropy (8bit):4.2825791311526515
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8JLmAQVm/xTsS9CfxTlijQkcjKxFvivn:46hVQc/psJxT8kyhkn
                                                                                      MD5:496D9183E2907199056CA236438498E1
                                                                                      SHA1:D9C3BB4AEBD9BFD942593694E796A8C2FB9217B8
                                                                                      SHA-256:4F32E1518BE3270F4DB80136FAC0031C385DD3CE133FAA534F141CF459C6113A
                                                                                      SHA-512:FA7FDEDDC42C36D0A60688CDBFE9A2060FE6B2644458D1EBFC817F1E5D5879EB3E3C78B5E53E9D3F42E2E4D84C93C4A7377170986A437EFF404F310D1D72F135
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sv DAYS_OF_WEEK_ABBREV [list \. "s\u00f6"\. "m\u00e5"\. "ti"\. "on"\. "to"\. "fr"\. "l\u00f6"]. ::msgcat::mcset sv DAYS_OF_WEEK_FULL [list \. "s\u00f6ndag"\. "m\u00e5ndag"\. "tisdag"\. "onsdag"\. "torsdag"\. "fredag"\. "l\u00f6rdag"]. ::msgcat::mcset sv MONTHS_ABBREV [list \. "jan"\. "feb"\. "mar"\. "apr"\. "maj"\. "jun"\. "jul"\. "aug"\. "sep"\. "okt"\. "nov"\. "dec"\. ""]. ::msgcat::mcset sv MONTHS_FULL [list \. "januari"\. "februari"\. "mars"\. "april"\. "maj"\. "juni"\. "juli"\. "augusti"\. "september"\. "oktober"\. "november"\. "december"\. ""]. ::msgcat::mcset sv BCE "f.Kr.". ::msgcat::mcset sv C
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):991
                                                                                      Entropy (8bit):4.024338627988864
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu8r4mc4Go/4mtVfqRvodJ3fjESBToOqe3lHvFgdF6A3ixTZ6OM5mSYoC6Vy:4azu88kGDiq1qhbJ75V9gZSpgmSm9
                                                                                      MD5:4DB24BA796D86ADF0441D2E75DE0C07E
                                                                                      SHA1:9935B36FF2B1C6DFDE3EC375BC471A0E93D1F7E3
                                                                                      SHA-256:6B5AB8AE265DB436B15D32263A8870EC55C7C0C07415B3F9BAAC37F73BC704E5
                                                                                      SHA-512:BE7ED0559A73D01537A1E51941ED19F0FEC3F14F9527715CB119E89C97BD31CC6102934B0349D8D0554F5EDD9E3A02978F7DE4919C000A77BD353F7033A4A95B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset sw DAYS_OF_WEEK_ABBREV [list \. "Jpi"\. "Jtt"\. "Jnn"\. "Jtn"\. "Alh"\. "Iju"\. "Jmo"]. ::msgcat::mcset sw DAYS_OF_WEEK_FULL [list \. "Jumapili"\. "Jumatatu"\. "Jumanne"\. "Jumatano"\. "Alhamisi"\. "Ijumaa"\. "Jumamosi"]. ::msgcat::mcset sw MONTHS_ABBREV [list \. "Jan"\. "Feb"\. "Mar"\. "Apr"\. "Mei"\. "Jun"\. "Jul"\. "Ago"\. "Sep"\. "Okt"\. "Nov"\. "Des"\. ""]. ::msgcat::mcset sw MONTHS_FULL [list \. "Januari"\. "Februari"\. "Machi"\. "Aprili"\. "Mei"\. "Juni"\. "Julai"\. "Agosti"\. "Septemba"\. "Oktoba"\. "Novemba"\. "Desemba"\. ""]. ::msgcat::mcset sw BCE "KK". ::msgcat::mcset sw CE "BK".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1835
                                                                                      Entropy (8bit):4.018233695396
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu83w0xn8dnzhmmlmYgtg+CKf6CO5ztFSLt8tCtGtv+CKf6CO5ztFSLt8tCtNu:46k0dgmmlmYgtE/t1H
                                                                                      MD5:2D9C969318D1740049D28EBBD4F62C1D
                                                                                      SHA1:121665081AFC33DDBCF679D7479BF0BC47FEF716
                                                                                      SHA-256:30A142A48E57F194ECC3AA9243930F3E6E1B4E8B331A8CDD2705EC9C280DCCBB
                                                                                      SHA-512:7C32907C39BFB89F558692535041B2A7FA18A64E072F5CF9AB95273F3AC5A7C480B4F953B13484A07AA4DA822613E27E78CC7B02ACE7A61E58FDB5507D7579C3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ta DAYS_OF_WEEK_FULL [list \. "\u0b9e\u0bbe\u0baf\u0bbf\u0bb1\u0bc1"\. "\u0ba4\u0bbf\u0b99\u0bcd\u0b95\u0bb3\u0bcd"\. "\u0b9a\u0bc6\u0bb5\u0bcd\u0bb5\u0bbe\u0baf\u0bcd"\. "\u0baa\u0bc1\u0ba4\u0ba9\u0bcd"\. "\u0bb5\u0bbf\u0baf\u0bbe\u0bb4\u0ba9\u0bcd"\. "\u0bb5\u0bc6\u0bb3\u0bcd\u0bb3\u0bbf"\. "\u0b9a\u0ba9\u0bbf"]. ::msgcat::mcset ta MONTHS_ABBREV [list \. "\u0b9c\u0ba9\u0bb5\u0bb0\u0bbf"\. "\u0baa\u0bc6\u0baa\u0bcd\u0bb0\u0bb5\u0bb0\u0bbf"\. "\u0bae\u0bbe\u0bb0\u0bcd\u0b9a\u0bcd"\. "\u0b8f\u0baa\u0bcd\u0bb0\u0bb2\u0bcd"\. "\u0bae\u0bc7"\. "\u0b9c\u0bc2\u0ba9\u0bcd"\. "\u0b9c\u0bc2\u0bb2\u0bc8"\. "\u0b86\u0b95\u0bb8\u0bcd\u0b9f\u0bcd"\. "\u0b9a\u0bc6\u0baa\u0bcd\u0b9f\u0bae\u0bcd\u0baa\u0bb0\u0bcd"\. "\u0b85\u0b95\u0bcd\u0b9f\u0bcb\u0baa\u0bb0\u0bcd"\. "\u0ba8\u0bb
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):251
                                                                                      Entropy (8bit):4.815592015875268
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmosDv+9/LosK3v6rZosDo+3v+6f6HK:4EnLzu8eDvWbK3v6r5DF3vmq
                                                                                      MD5:293456B39BE945C55536A5DD894787F0
                                                                                      SHA1:94DEF0056C7E3082E58266BCE436A61C045EA394
                                                                                      SHA-256:AA57D5FB5CC3F59EC6A3F99D7A5184403809AA3A3BC02ED0842507D4218B683D
                                                                                      SHA-512:AB763F2932F2FF48AC18C8715F661F7405607E1818B53E0D0F32184ABE67714F03A39A9D0637D0D93CE43606C3E1D702D2A3F8660C288F61DFE852747B652B59
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset ta_IN DATE_FORMAT "%d %M %Y". ::msgcat::mcset ta_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset ta_IN DATE_TIME_FORMAT "%d %M %Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2102
                                                                                      Entropy (8bit):4.034298184367717
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:46x9mcib30Rgu1je5YdnULEP8l1je5YdnULEPt:hnIb39ufbufV
                                                                                      MD5:0B9B124076C52A503A906059F7446077
                                                                                      SHA1:F43A0F6CCBDDBDD5EA140C7FA55E9A82AB910A03
                                                                                      SHA-256:42C34D02A6079C4D0D683750B3809F345637BC6D814652C3FB0B344B66B70C79
                                                                                      SHA-512:234B9ACA1823D1D6B82583727B4EA68C014D59916B410CB9B158FA1954B6FC3767A261BD0B9F592AF0663906ADF11C2C9A3CC0A325CB1FF58F42A884AF7CB015
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset te DAYS_OF_WEEK_ABBREV [list \. "\u0c06\u0c26\u0c3f"\. "\u0c38\u0c4b\u0c2e"\. "\u0c2e\u0c02\u0c17\u0c33"\. "\u0c2c\u0c41\u0c27"\. "\u0c17\u0c41\u0c30\u0c41"\. "\u0c36\u0c41\u0c15\u0c4d\u0c30"\. "\u0c36\u0c28\u0c3f"]. ::msgcat::mcset te DAYS_OF_WEEK_FULL [list \. "\u0c06\u0c26\u0c3f\u0c35\u0c3e\u0c30\u0c02"\. "\u0c38\u0c4b\u0c2e\u0c35\u0c3e\u0c30\u0c02"\. "\u0c2e\u0c02\u0c17\u0c33\u0c35\u0c3e\u0c30\u0c02"\. "\u0c2c\u0c41\u0c27\u0c35\u0c3e\u0c30\u0c02"\. "\u0c17\u0c41\u0c30\u0c41\u0c35\u0c3e\u0c30\u0c02"\. "\u0c36\u0c41\u0c15\u0c4d\u0c30\u0c35\u0c3e\u0c30\u0c02"\. "\u0c36\u0c28\u0c3f\u0c35\u0c3e\u0c30\u0c02"]. ::msgcat::mcset te MONTHS_ABBREV [list \. "\u0c1c\u0c28\u0c35\u0c30\u0c3f"\. "\u0c2b\u0c3f\u0c2c\u0c4d\u0c30\u0c35\u0c30\u0c3f"\. "\u0c2e\u0c3e\u0c30\u0c4d\u0c1a\u
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):411
                                                                                      Entropy (8bit):5.01781242466238
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu8CjZWsn0sEjoD0sLvUFS3v6r5F3vMq:4azu84Z1nnEjoDnLvUFEvS5NvMq
                                                                                      MD5:443E34E2E2BC7CB64A8BA52D99D6B4B6
                                                                                      SHA1:D323C03747FE68E9B73F7E5C1E10B168A40F2A2F
                                                                                      SHA-256:88BDAF4B25B684B0320A2E11D3FE77DDDD25E3B17141BD7ED1D63698C480E4BA
                                                                                      SHA-512:5D8B267530EC1480BF3D571AABC2DA7B4101EACD7FB03B49049709E39D665DD7ACB66FD785BA2B5203DDC54C520434219D2D9974A1E9EE74C659FFAEA6B694E0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset te_IN AM "\u0c2a\u0c42\u0c30\u0c4d\u0c35\u0c3e\u0c39\u0c4d\u0c28". ::msgcat::mcset te_IN PM "\u0c05\u0c2a\u0c30\u0c3e\u0c39\u0c4d\u0c28". ::msgcat::mcset te_IN DATE_FORMAT "%d/%m/%Y". ::msgcat::mcset te_IN TIME_FORMAT_12 "%I:%M:%S %P". ::msgcat::mcset te_IN DATE_TIME_FORMAT "%d/%m/%Y %I:%M:%S %P %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2305
                                                                                      Entropy (8bit):4.324407451316591
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:46P4QX/wQT0H/u3rPc8JD57XWWND8QM70xJi53Ljtef:hQ556rVDWZcLOO
                                                                                      MD5:D145F9DF0E339A2538662BD752F02E16
                                                                                      SHA1:AFD97F8E8CC14D306DEDD78F8F395738E38A8569
                                                                                      SHA-256:F9641A6EBE3845CE5D36CED473749F5909C90C52E405F074A6DA817EF6F39867
                                                                                      SHA-512:E17925057560462F730CF8288856E46FA1F1D2A10B5D4D343257B7687A3855014D5C65B6C85AC55A7C77B8B355DB19F053C74B91DFA7BE7E9F933D9D4DA117F7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset th DAYS_OF_WEEK_ABBREV [list \. "\u0e2d\u0e32."\. "\u0e08."\. "\u0e2d."\. "\u0e1e."\. "\u0e1e\u0e24."\. "\u0e28."\. "\u0e2a."]. ::msgcat::mcset th DAYS_OF_WEEK_FULL [list \. "\u0e27\u0e31\u0e19\u0e2d\u0e32\u0e17\u0e34\u0e15\u0e22\u0e4c"\. "\u0e27\u0e31\u0e19\u0e08\u0e31\u0e19\u0e17\u0e23\u0e4c"\. "\u0e27\u0e31\u0e19\u0e2d\u0e31\u0e07\u0e04\u0e32\u0e23"\. "\u0e27\u0e31\u0e19\u0e1e\u0e38\u0e18"\. "\u0e27\u0e31\u0e19\u0e1e\u0e24\u0e2b\u0e31\u0e2a\u0e1a\u0e14\u0e35"\. "\u0e27\u0e31\u0e19\u0e28\u0e38\u0e01\u0e23\u0e4c"\. "\u0e27\u0e31\u0e19\u0e40\u0e2a\u0e32\u0e23\u0e4c"]. ::msgcat::mcset th MONTHS_ABBREV [list \. "\u0e21.\u0e04."\. "\u0e01.\u0e1e."\. "\u0e21\u0e35.\u0e04."\. "\u0e40\u0e21.\u0e22."\. "\u0e1e.\u0e04."\. "\u0e21\u0e34.\u0e22."\. "\
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1133
                                                                                      Entropy (8bit):4.32041719596907
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu80VAFVsNTib5vk5CfYTnGk65GmogWFLNvoKvWI3:46j8NTgwVTnlSJWFLJvWI3
                                                                                      MD5:3AFAD9AD82A9C8B754E2FE8FC0094BAB
                                                                                      SHA1:4EE3E2DF86612DB314F8D3E7214D7BE241AA1A32
                                                                                      SHA-256:DF7C4BA67457CB47EEF0F5CA8E028FF466ACDD877A487697DC48ECAC7347AC47
                                                                                      SHA-512:79A6738A97B7DB9CA4AE9A3BA1C3E56BE9AC67E71AE12154FD37A37D78892B6414A49E10E007DE2EB314942DC017B87FAB7C64B74EC9B889DAEBFF9B3B78E644
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset tr DAYS_OF_WEEK_ABBREV [list \. "Paz"\. "Pzt"\. "Sal"\. "\u00c7ar"\. "Per"\. "Cum"\. "Cmt"]. ::msgcat::mcset tr DAYS_OF_WEEK_FULL [list \. "Pazar"\. "Pazartesi"\. "Sal\u0131"\. "\u00c7ar\u015famba"\. "Per\u015fembe"\. "Cuma"\. "Cumartesi"]. ::msgcat::mcset tr MONTHS_ABBREV [list \. "Oca"\. "\u015eub"\. "Mar"\. "Nis"\. "May"\. "Haz"\. "Tem"\. "A\u011fu"\. "Eyl"\. "Eki"\. "Kas"\. "Ara"\. ""]. ::msgcat::mcset tr MONTHS_FULL [list \. "Ocak"\. "\u015eubat"\. "Mart"\. "Nisan"\. "May\u0131s"\. "Haziran"\. "Temmuz"\. "A\u011fustos"\. "Eyl\u00fcl"\. "Ekim"\. "Kas\u0131m"\. "Aral\u0131k"\. ""]. ::msgcat::mcset tr D
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2113
                                                                                      Entropy (8bit):4.227105489438195
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:46+ytFoQAQPHUKPo6eQ4QBuQ0WbQcJeyFQDWZlQD1QbS7XQn1Q7mDaSAJQ7GMLzM:hIpP5tzYhTUhAgEAE+
                                                                                      MD5:458A38F894B296C83F85A53A92FF8520
                                                                                      SHA1:CE26187875E334C712FDAB73E6B526247C6FE1CF
                                                                                      SHA-256:CF2E78EF3322F0121E958098EF5F92DA008344657A73439EAC658CB6BF3D72BD
                                                                                      SHA-512:3B8730C331CF29EF9DEDBC9D5A53C50D429931B8DA01EE0C20DAE25B995114966DB9BC576BE0696DEC088DB1D88B50DE2C376275AB5251F49F6544E546BBC531
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset uk DAYS_OF_WEEK_ABBREV [list \. "\u043d\u0434"\. "\u043f\u043d"\. "\u0432\u0442"\. "\u0441\u0440"\. "\u0447\u0442"\. "\u043f\u0442"\. "\u0441\u0431"]. ::msgcat::mcset uk DAYS_OF_WEEK_FULL [list \. "\u043d\u0435\u0434\u0456\u043b\u044f"\. "\u043f\u043e\u043d\u0435\u0434\u0456\u043b\u043e\u043a"\. "\u0432\u0456\u0432\u0442\u043e\u0440\u043e\u043a"\. "\u0441\u0435\u0440\u0435\u0434\u0430"\. "\u0447\u0435\u0442\u0432\u0435\u0440"\. "\u043f'\u044f\u0442\u043d\u0438\u0446\u044f"\. "\u0441\u0443\u0431\u043e\u0442\u0430"]. ::msgcat::mcset uk MONTHS_ABBREV [list \. "\u0441\u0456\u0447"\. "\u043b\u044e\u0442"\. "\u0431\u0435\u0440"\. "\u043a\u0432\u0456\u0442"\. "\u0442\u0440\u0430\u0432"\. "\u0447\u0435\u0440\u0432"\. "\u043b\u0438\u043f"\. "\
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1421
                                                                                      Entropy (8bit):4.382223858419589
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:4azu8pNu9UT5xDHy2W82yGWnf/oxHFBSWWS1D/avSv16:46Oixzy2IyhwZ17cU16
                                                                                      MD5:3BD0AB95976D1B80A30547E4B23FD595
                                                                                      SHA1:B3E5DC095973E46D8808326B2A1FC45046B5267F
                                                                                      SHA-256:9C69094C0BD52D5AE8448431574EAE8EE4BE31EC2E8602366DF6C6BF4BC89A58
                                                                                      SHA-512:2A68A7ADC385EDEA02E4558884A24DCC6328CC9F7D459CC03CC9F2D2F58CF6FF2103AD5B45C6D05B7E13F28408C6B05CDDF1DF60E822E5095F86A49052E19E59
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset vi DAYS_OF_WEEK_ABBREV [list \. "Th 2"\. "Th 3"\. "Th 4"\. "Th 5"\. "Th 6"\. "Th 7"\. "CN"]. ::msgcat::mcset vi DAYS_OF_WEEK_FULL [list \. "Th\u01b0\u0301 hai"\. "Th\u01b0\u0301 ba"\. "Th\u01b0\u0301 t\u01b0"\. "Th\u01b0\u0301 n\u0103m"\. "Th\u01b0\u0301 s\u00e1u"\. "Th\u01b0\u0301 ba\u0309y"\. "Chu\u0309 nh\u00e2\u0323t"]. ::msgcat::mcset vi MONTHS_ABBREV [list \. "Thg 1"\. "Thg 2"\. "Thg 3"\. "Thg 4"\. "Thg 5"\. "Thg 6"\. "Thg 7"\. "Thg 8"\. "Thg 9"\. "Thg 10"\. "Thg 11"\. "Thg 12"\. ""]. ::msgcat::mcset vi MONTHS_FULL [list \. "Th\u00e1ng m\u00f4\u0323t"\. "Th\u00e1ng hai"\. "Th\u00e1ng ba"\. "Th\u00e1ng t\u01b0"\. "Th\u00e1ng n\u0103m"\. "Th\u00e1ng s\
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text, with very long lines (1598)
                                                                                      Category:dropped
                                                                                      Size (bytes):3330
                                                                                      Entropy (8bit):4.469203967086526
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:468jDI/Tw71xDqwPqDa8c3FLbYmhyvMDKbW0YGLuoEyzag29dL:hn7wRdNL
                                                                                      MD5:9C33FFDD4C13D2357AB595EC3BA70F04
                                                                                      SHA1:A87F20F7A331DEFC33496ECDA50D855C8396E040
                                                                                      SHA-256:EF81B41EC69F67A394ECE2B3983B67B3D0C8813624C2BFA1D8A8C15B21608AC9
                                                                                      SHA-512:E31EEE90660236BCD958F3C540F56B2583290BAD6086AE78198A0819A92CF2394C62DE3800FDDD466A8068F4CABDFBCA46A648D419B1D0103381BF428D721B13
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh DAYS_OF_WEEK_ABBREV [list \. "\u661f\u671f\u65e5"\. "\u661f\u671f\u4e00"\. "\u661f\u671f\u4e8c"\. "\u661f\u671f\u4e09"\. "\u661f\u671f\u56db"\. "\u661f\u671f\u4e94"\. "\u661f\u671f\u516d"]. ::msgcat::mcset zh DAYS_OF_WEEK_FULL [list \. "\u661f\u671f\u65e5"\. "\u661f\u671f\u4e00"\. "\u661f\u671f\u4e8c"\. "\u661f\u671f\u4e09"\. "\u661f\u671f\u56db"\. "\u661f\u671f\u4e94"\. "\u661f\u671f\u516d"]. ::msgcat::mcset zh MONTHS_ABBREV [list \. "\u4e00\u6708"\. "\u4e8c\u6708"\. "\u4e09\u6708"\. "\u56db\u6708"\. "\u4e94\u6708"\. "\u516d\u6708"\. "\u4e03\u6708"\. "\u516b\u6708"\. "\u4e5d\u6708"\. "\u5341\u6708"\. "\u5341\u4e00\u6708"\. "\u5341\u4e8c\u6708"\. ""]. ::msgcat::mcset zh MONTHS_FULL [list \.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):312
                                                                                      Entropy (8bit):5.1281364096481665
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoX5HoHJ+3vtfNrFLoHJ+3v6MY+oXa+3vYq9:4EnLzu8d5eJ+3vtNEJ+3v6L1L3vYq9
                                                                                      MD5:EB94B41551EAAFFA5DF4F406C7ACA3A4
                                                                                      SHA1:B0553108BDE43AA7ED362E2BFFAF1ABCA1567491
                                                                                      SHA-256:85F91CF6E316774AA5D0C1ECA85C88E591FD537165BB79929C5E6A1CA99E56C8
                                                                                      SHA-512:A0980A6F1AD9236647E4F18CC104999DB2C523153E8716FD0CFE57320E906DF80378A5C0CDE132F2C53F160F5304EAF34910D7D1BB5753987D74AFBC0B6F75F3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh_CN DATE_FORMAT "%Y-%m-%e". ::msgcat::mcset zh_CN TIME_FORMAT "%k:%M:%S". ::msgcat::mcset zh_CN TIME_FORMAT_12 "%P%I\u65f6%M\u5206%S\u79d2". ::msgcat::mcset zh_CN DATE_TIME_FORMAT "%Y-%m-%e %k:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):752
                                                                                      Entropy (8bit):4.660158381384211
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:4EnLzu8qmDBHZLX+TyW4OU5yPgM9Lz+SC3WwLNMW3v6G3v3Ww+:4azu8qyFOw3WwLrvTv3Ww+
                                                                                      MD5:D8C6BFBFCE44B6A8A038BA44CB3DB550
                                                                                      SHA1:FBD609576E65B56EDA67FD8A1801A27B43DB5486
                                                                                      SHA-256:D123E0B4C2614F680808B58CCA0C140BA187494B2C8BCF8C604C7EB739C70882
                                                                                      SHA-512:3455145CF5C77FC847909AB1A283452D0C877158616C8AA7BDFFC141B86B2E66F9FF45C3BB6A4A9D758D2F8FFCB1FE919477C4553EFE527C0EDC912EBBCAABCD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh_HK DAYS_OF_WEEK_ABBREV [list \. "\u65e5"\. "\u4e00"\. "\u4e8c"\. "\u4e09"\. "\u56db"\. "\u4e94"\. "\u516d"]. ::msgcat::mcset zh_HK MONTHS_ABBREV [list \. "1\u6708"\. "2\u6708"\. "3\u6708"\. "4\u6708"\. "5\u6708"\. "6\u6708"\. "7\u6708"\. "8\u6708"\. "9\u6708"\. "10\u6708"\. "11\u6708"\. "12\u6708"\. ""]. ::msgcat::mcset zh_HK DATE_FORMAT "%Y\u5e74%m\u6708%e\u65e5". ::msgcat::mcset zh_HK TIME_FORMAT_12 "%P%I:%M:%S". ::msgcat::mcset zh_HK DATE_TIME_FORMAT "%Y\u5e74%m\u6708%e\u65e5 %P%I:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):339
                                                                                      Entropy (8bit):5.020358587042703
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoOpxoPpSocvNLohX3v6ZhLoh+3v6fJ:4EnLzu8WvNo3v6b3vu
                                                                                      MD5:E0BC93B8F050D6D80B8173FF4FA4D7B7
                                                                                      SHA1:231FF1B6F859D0261F15D2422DF09E756CE50CCB
                                                                                      SHA-256:2683517766AF9DA0D87B7A862DE9ADEA82D9A1454FC773A9E3C1A6D92ABA947A
                                                                                      SHA-512:8BA6EAC5F71167B83A58B47123ACF7939C348FE2A0CA2F092FE9F60C0CCFB901ADA0E8F2101C282C39BAE86C918390985731A8F66E481F8074732C37CD50727F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh_SG AM "\u4e0a\u5348". ::msgcat::mcset zh_SG PM "\u4e2d\u5348". ::msgcat::mcset zh_SG DATE_FORMAT "%d %B %Y". ::msgcat::mcset zh_SG TIME_FORMAT_12 "%P %I:%M:%S". ::msgcat::mcset zh_SG DATE_TIME_FORMAT "%d %B %Y %P %I:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):346
                                                                                      Entropy (8bit):5.08314435797197
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSyEtJLlpuoo6dmoAykaRULH/XRxvBoAyjZRULH5oAyU/G0OZoAyxW3v6ZhLoAR:4EnLzu8I5xEOKRWW3v6w3v8AC
                                                                                      MD5:9CD17E7F28186E0E71932CC241D1CBB1
                                                                                      SHA1:AF1EE536AABB8198BA88D3474ED49F76A37E89FF
                                                                                      SHA-256:D582406C51A3DB1EADF6507C50A1F85740FDA7DA8E27FC1438FEB6242900CB12
                                                                                      SHA-512:4712DD6A27A09EA339615FC3D17BC8E4CD64FF12B2B8012E01FD4D3E7789263899FA05EDDB77044DC7B7D32B3DC55A52B8320D93499DF9A6799A8E4D07174525
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/loadICU.tcl -- do not edit.namespace eval ::tcl::clock {. ::msgcat::mcset zh_TW BCE "\u6c11\u570b\u524d". ::msgcat::mcset zh_TW CE "\u6c11\u570b". ::msgcat::mcset zh_TW DATE_FORMAT "%Y/%m/%e". ::msgcat::mcset zh_TW TIME_FORMAT_12 "%P %I:%M:%S". ::msgcat::mcset zh_TW DATE_TIME_FORMAT "%Y/%m/%e %P %I:%M:%S %z".}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):32718
                                                                                      Entropy (8bit):4.5415166585248645
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:UczgW5gzrui4sKDt9C7sGbHMmjJbuQH8A2Q:VgTrrvf7sGbHDFSQH8/Q
                                                                                      MD5:1A7DF33BC47D63F9CE1D4FF70A974FA3
                                                                                      SHA1:513EC2215E2124D9A6F6DF2549C1442109E117C0
                                                                                      SHA-256:C5D74E1C927540A3F524E6B929D0956EFBA0797FB8D55918EF69D27DF57DEDA3
                                                                                      SHA-512:F671D5A46382EDFBDA49A6EDB9E6CF2D5CEBD83CE4ADD6B717A478D52748332D41DA3743182D4555B801B96A318D29DFC6AC36B32983ADB32D329C24F8A3D713
                                                                                      Malicious:false
                                                                                      Preview:# optparse.tcl --.#.# (private) Option parsing package.# Primarily used internally by the safe:: code..#.#.WARNING: This code will go away in a future release.#.of Tcl. It is NOT supported and you should not rely.#.on it. If your code does rely on this package you.#.may directly incorporate this code into your application...package require Tcl 8.2.# When this version number changes, update the pkgIndex.tcl file.# and the install directory in the Makefiles..package provide opt 0.4.6..namespace eval ::tcl {.. # Exported APIs. namespace export OptKeyRegister OptKeyDelete OptKeyError OptKeyParse \. OptProc OptProcArgGiven OptParse \.. Lempty Lget \. Lassign Lvarpop Lvarpop1 Lvarset Lvarincr \. SetMax SetMin...################# Example of use / 'user documentation' ###################.. proc OptCreateTestProc {} {...# Defines ::tcl::OptParseTest as a test proc with parsed arguments..# (can't be defined before the code below is
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):607
                                                                                      Entropy (8bit):4.652658850873767
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:jHxJRuMopS42wyGlTajUA43KXks4L1GbyvX6VxQ+pBbX:bvRmS42wyGlTah9XkbL7X6VxBB
                                                                                      MD5:92FF1E42CFC5FECCE95068FC38D995B3
                                                                                      SHA1:B2E71842F14D5422A9093115D52F19BCCA1BF881
                                                                                      SHA-256:EB9925A8F0FCC7C2A1113968AB0537180E10C9187B139C8371ADF821C7B56718
                                                                                      SHA-512:608D436395D055C5449A53208F3869B8793DF267B8476AD31BCDD9659A222797814832720C495D938E34BF7D253FFC3F01A73CC0399C0DFB9C85D2789C7F11C0
                                                                                      Malicious:false
                                                                                      Preview:# Tcl package index file, version 1.1.# This file is generated by the "pkg_mkIndex -direct" command.# and sourced either when an application starts up or.# by a "package unknown" script. It invokes the.# "package ifneeded" command to set up package-related.# information so that packages will be loaded automatically.# in response to "package require" commands. When this.# script is sourced, the variable $dir must contain the.# full path name of this file's directory...if {![package vsatisfies [package provide Tcl] 8.2]} {return}.package ifneeded opt 0.4.6 [list source [file join $dir optparse.tcl]].
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):22959
                                                                                      Entropy (8bit):4.836555290409911
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:I72oQXm9jcLyBLWueSzvAXMiow90l3NhETrh4NLTluYhoNL3ZAqYi:I72oQXmgyBCqvAcFw2dhOrh4NZVhoN3F
                                                                                      MD5:55E2DB5DCF8D49F8CD5B7D64FEA640C7
                                                                                      SHA1:8FDC28822B0CC08FA3569A14A8C96EDCA03BFBBD
                                                                                      SHA-256:47B6AF117199B1511F6103EC966A58E2FD41F0ABA775C44692B2069F6ED10BAD
                                                                                      SHA-512:824C210106DE7EAE57A480E3F6E3A5C8FB8AC4BBF0A0A386D576D3EB2A3AC849BDFE638428184056DA9E81767E2B63EFF8E18068A1CF5149C9F8A018F817D3E5
                                                                                      Malicious:false
                                                                                      Preview:# package.tcl --.#.# utility procs formerly in init.tcl which can be loaded on demand.# for package management..#.# Copyright (c) 1991-1993 The Regents of the University of California..# Copyright (c) 1994-1998 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..namespace eval tcl::Pkg {}..# ::tcl::Pkg::CompareExtension --.#.# Used internally by pkg_mkIndex to compare the extension of a file to a given.# extension. On Windows, it uses a case-insensitive comparison because the.# file system can be file insensitive..#.# Arguments:.# fileName.name of a file whose extension is compared.# ext..(optional) The extension to compare against; you must.#..provide the starting dot..#..Defaults to [info sharedlibextension].#.# Results:.# Returns 1 if the extension matches, 0 otherwise..proc tcl::Pkg::CompareExtension {fileName {ext {}}} {. global tcl_platform. if {$ext eq ""} {set ext
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):816
                                                                                      Entropy (8bit):4.833285375693491
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:TcS2n1RBbgZKaNHaeYFSxYmXqt9IGUafZwXgEImK7k35IpbdELS8/McjbPgnE:TcHn5sZKGkwa/JxfJmRGNc93j7CE
                                                                                      MD5:FCDAF75995F2CCE0A5D5943E9585590D
                                                                                      SHA1:A0B1BD4E68DCE1768D3C5E0D3C7B31E28021D3BA
                                                                                      SHA-256:EBE5A2B4CBBCD7FD3F7A6F76D68D7856301DB01B350C040942A7B806A46E0014
                                                                                      SHA-512:A632D0169EE3B6E6B7EF73F5FBA4B7897F9491BDB389D78165E297252424546EFB43895D3DD530864B9FCF2ECF5BCE7DA8E55BA5B4F20E23E1E45ADDAF941C11
                                                                                      Malicious:false
                                                                                      Preview:# parray:.# Print the contents of a global array on stdout..#.# Copyright (c) 1991-1993 The Regents of the University of California..# Copyright (c) 1994 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..proc parray {a {pattern *}} {. upvar 1 $a array. if {![array exists array]} {..return -code error "\"$a\" isn't an array". }. set maxl 0. set names [lsort [array names array $pattern]]. foreach name $names {..if {[string length $name] > $maxl} {.. set maxl [string length $name]..}. }. set maxl [expr {$maxl + [string length $a] + 2}]. foreach name $names {..set nameString [format %s(%s) $a $name]..puts stdout [format "%-*s = %s" $maxl $nameString $array($name)]. }.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):33439
                                                                                      Entropy (8bit):4.750571844372246
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:OovFcXxzYqZ1//L2J4lb77BvnthiV0EnoQI4MnNhGQmzY3wKIYkA:OovFcqqZF2J4lb7Rrg0EnoQI4INhGrzu
                                                                                      MD5:325A573F30C9EA70FD891E85664E662C
                                                                                      SHA1:6EC3F21EBCFD269847C43891DAD96189FACF20E4
                                                                                      SHA-256:89B74D2417EB27FEEA32B8666B08D28BC1FFE5DCF1652DBD8799F7555D79C71F
                                                                                      SHA-512:149FE725A3234A2F8C3EE1B03119440E3CB16586F04451B6E62CED0097B1AD227C97B55F5A66631033A888E860AB61CAF7DDD014696276BC9226D87F15164E2F
                                                                                      Malicious:false
                                                                                      Preview:# safe.tcl --.#.# This file provide a safe loading/sourcing mechanism for safe interpreters..# It implements a virtual path mecanism to hide the real pathnames from the.# slave. It runs in a master interpreter and sets up data structure and.# aliases that will be invoked when used from a slave interpreter..#.# See the safe.n man page for details..#.# Copyright (c) 1996-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES...#.# The implementation is based on namespaces. These naming conventions are.# followed:.# Private procs starts with uppercase..# Public procs are exported and starts with lowercase.#..# Needed utilities package.package require opt 0.4.1..# Create the safe namespace.namespace eval ::safe {. # Exported API:. namespace export interpCreate interpInit interpConfigure interpDelete \..interpAddToAccessPath interpFindInAccessPath setLogCmd.}..# Helper function to
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5415
                                                                                      Entropy (8bit):4.701682771925196
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:esataNULULUVUhU5U1UIUZUJeUpgURUFD15Q0AkU6PkrBkGUjZKspDzmK5SMFTub:eNtEACkiwM3g4ePOiD15Q0AkU6PkrBko
                                                                                      MD5:E127196E9174B429CC09C040158F6AAB
                                                                                      SHA1:FF850F5D1BD8EFC1A8CB765FE8221330F0C6C699
                                                                                      SHA-256:ABF7D9D1E86DE931096C21820BFA4FD70DB1F55005D2DB4AA674D86200867806
                                                                                      SHA-512:C4B98EBC65E25DF41E6B9A93E16E608CF309FA0AE712578EE4974D84F7F33BCF2A6ED7626E88A343350E13DA0C5C1A88E24A87FCBD44F7DA5983BB3EF036A162
                                                                                      Malicious:false
                                                                                      Preview:# Tcl autoload index file, version 2.0.# -*- tcl -*-.# This file is generated by the "auto_mkindex" command.# and sourced to set up indexing information for one or.# more commands. Typically each line is a command that.# sets an element in the auto_index array, where the.# element name is the name of a command and the value is.# a script that loads the command...set auto_index(auto_reset) [list source [file join $dir auto.tcl]].set auto_index(tcl_findLibrary) [list source [file join $dir auto.tcl]].set auto_index(auto_mkindex) [list source [file join $dir auto.tcl]].set auto_index(auto_mkindex_old) [list source [file join $dir auto.tcl]].set auto_index(::auto_mkindex_parser::init) [list source [file join $dir auto.tcl]].set auto_index(::auto_mkindex_parser::cleanup) [list source [file join $dir auto.tcl]].set auto_index(::auto_mkindex_parser::mkindex) [list source [file join $dir auto.tcl]].set auto_index(::auto_mkindex_parser::hook) [list source [file join $dir auto.tcl]].set auto_in
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):11633
                                                                                      Entropy (8bit):4.706526847377957
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:CnjVD6gOGFpvXKPrzYkWo55z3ovPvKvaWZPZ9W6TV9ujpZw7K3mQ4auPltqQvu9:CGQvX+XYkn59YvPSvDJTV9174zuPltBC
                                                                                      MD5:F9ED2096EEA0F998C6701DB8309F95A6
                                                                                      SHA1:BCDB4F7E3DB3E2D78D25ED4E9231297465B45DB8
                                                                                      SHA-256:6437BD7040206D3F2DB734FA482B6E79C68BCC950FBA80C544C7F390BA158F9B
                                                                                      SHA-512:E4FB8F28DC72EA913F79CEDF5776788A0310608236D6607ADC441E7F3036D589FD2B31C446C187EF5827FD37DCAA26D9E94D802513E3BF3300E94DD939695B30
                                                                                      Malicious:false
                                                                                      Preview:# -*- tcl -*-.#.# Searching for Tcl Modules. Defines a procedure, declares it as the primary.# command for finding packages, however also uses the former 'package unknown'.# command as a fallback..#.# Locates all possible packages in a directory via a less restricted glob. The.# targeted directory is derived from the name of the requested package, i.e..# the TM scan will look only at directories which can contain the requested.# package. It will register all packages it found in the directory so that.# future requests have a higher chance of being fulfilled by the ifneeded.# database without having to come to us again..#.# We do not remember where we have been and simply rescan targeted directories.# when invoked again. The reasoning is this:.#.# - The only way we get back to the same directory is if someone is trying to.# [package require] something that wasn't there on the first scan..#.# Either.# 1) It is there now: If we rescan, you get it; if not you don't..#.# This co
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):141
                                                                                      Entropy (8bit):4.951583909886815
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52DcsG/kXGm2OHnFvpsYvUdSalHFLd:SlSWB9X52DBGTm2OHnFvmYValHf
                                                                                      MD5:6FB79707FD3A183F8A3C780CA2669D27
                                                                                      SHA1:E703AB552B4231827ACD7872364C36C70988E4C0
                                                                                      SHA-256:A5DC7BFB4F569361D438C8CF13A146CC2641A1A884ACF905BB51DA28FF29A900
                                                                                      SHA-512:CDD3AD9AFFD246F4DFC40C1699E368FB2924E73928060B1178D298DCDB11DBD0E88BC10ED2FED265F7F7271AC5CCE14A60D65205084E9249154B8D54C2309E52
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Abidjan) {. {-9223372036854775808 -968 0 LMT}. {-1830383032 0 0 GMT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1393
                                                                                      Entropy (8bit):3.9087586646312253
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52DUsmdHvdDZxdCjFaEu3MEANKSgI3u2VuTSr0l+pU4Y4Y0gK:cQ9elDZxdCwEu3MEANKSgsrVkvY64Y4
                                                                                      MD5:FFEDB06126D6DA9F3BECA614428F51E9
                                                                                      SHA1:2C549D1CF8636541D42BDC56D8E534A222E4642C
                                                                                      SHA-256:567A0AD3D2C9E356A2E38A76AF4D5C4B8D5B950AF7B648A027FE816ACAE455AE
                                                                                      SHA-512:E057EA59A47C881C60B2196554C9B24C00CB26345CA7E311B5409F6FBB31EBEDD13C41A4C3B0B68AE8B93F4819158D94610DE795112E77209F391AC31332BA2A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Accra) {. {-9223372036854775808 -52 0 LMT}. {-1640995148 0 0 GMT}. {-1556841600 1200 1 GMT}. {-1546388400 0 0 GMT}. {-1525305600 1200 1 GMT}. {-1514852400 0 0 GMT}. {-1493769600 1200 1 GMT}. {-1483316400 0 0 GMT}. {-1462233600 1200 1 GMT}. {-1451780400 0 0 GMT}. {-1430611200 1200 1 GMT}. {-1420158000 0 0 GMT}. {-1399075200 1200 1 GMT}. {-1388622000 0 0 GMT}. {-1367539200 1200 1 GMT}. {-1357086000 0 0 GMT}. {-1336003200 1200 1 GMT}. {-1325550000 0 0 GMT}. {-1304380800 1200 1 GMT}. {-1293927600 0 0 GMT}. {-1272844800 1200 1 GMT}. {-1262391600 0 0 GMT}. {-1241308800 1200 1 GMT}. {-1230855600 0 0 GMT}. {-1209772800 1200 1 GMT}. {-1199319600 0 0 GMT}. {-1178150400 1200 1 GMT}. {-1167697200 0 0 GMT}. {-1146614400 1200 1 GMT}. {-1136161200 0 0 GMT}. {-1115078400 1200 1 GMT}. {-1104625200 0 0 GMT}. {-1083542400 1200 1 GMT}. {-1073
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.766991307890532
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DczqIVDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DnaDkr
                                                                                      MD5:C203A97FC500E408AC841A6A5B21E14E
                                                                                      SHA1:ED4C4AA578A16EB83220F37199460BFE207D2B44
                                                                                      SHA-256:3EBC66964609493524809AD0A730FFFF036C38D9AB3770412841F80DFFC717D5
                                                                                      SHA-512:2F1A4500F49AFD013BCA70089B1E24748D7E45D41F2C9D3D9AFDCC1778E750FFB020D34F622B071E80F80CC0FEFF080E8ACC1E7A8ABE8AD12C0F1A1DAA937FE5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Addis_Ababa) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1041
                                                                                      Entropy (8bit):4.110061823095588
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52D7AmdHh5PMybVSqSFvvqXFaLSaSxmvWo/fmvCkQ6eW6Xs8QQB1r5Q:cQIefMyb8BF6XFaLSxktf1PW6X4q1K
                                                                                      MD5:8221A83520B1D3DE02E886CFB1948DE3
                                                                                      SHA1:0806A0898FDE6F5AE502C64515A1345D71B1F7D2
                                                                                      SHA-256:5EE3B25676E813D89ED866D03B5C3388567D8307A2A60D1C4A34D938CBADF710
                                                                                      SHA-512:2B8A837F7CF6DE43DF4072BF4A54226235DA8B8CA78EF55649C7BF133B2E002C614FE7C693004E3B17C25FBCECAAD5CD9B0A8CB0A5D32ADF68EA019203EE8704
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Algiers) {. {-9223372036854775808 732 0 LMT}. {-2486679072 561 0 PMT}. {-1855958961 0 0 WET}. {-1689814800 3600 1 WEST}. {-1680397200 0 0 WET}. {-1665363600 3600 1 WEST}. {-1648342800 0 0 WET}. {-1635123600 3600 1 WEST}. {-1616893200 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585443600 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552266000 0 0 WET}. {-1539997200 3600 1 WEST}. {-1531443600 0 0 WET}. {-956365200 3600 1 WEST}. {-950486400 0 0 WET}. {-942012000 3600 0 CET}. {-812502000 7200 1 CEST}. {-796262400 3600 0 CET}. {-781052400 7200 1 CEST}. {-766630800 3600 0 CET}. {-733280400 0 0 WET}. {-439430400 3600 0 CET}. {-212029200 0 0 WET}. {41468400 3600 1 WEST}. {54774000 0 0 WET}. {231724800 3600 1 WEST}. {246240000 3600 0 CET}. {259545600 7200 1 CEST}. {275274000 3600 0 CET}. {309740400 0 0 WET}. {325468800 3600 1 WEST}. {3418020
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.750118730136804
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcjEUEH+DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DGs+Dkr
                                                                                      MD5:F8CEC826666174899C038EC9869576ED
                                                                                      SHA1:4CAA32BB070F31BE919F5A03141711DB22072E2C
                                                                                      SHA-256:D9C940B3BE2F9E424BC6F69D665C21FBCA7F33789E1FE1D27312C0B38B75E097
                                                                                      SHA-512:DA890F5A6806AE6774CFC061DFD4AE069F78212AB063287146245692383022AABB3637DEB49C1D512DA3499DC4295541962DAC05729302B3314E7BF306E6CB41
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Asmara) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.755468133981916
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcjAWDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2D8Dkr
                                                                                      MD5:8B5DCBBDB2309381EAA8488E1551655F
                                                                                      SHA1:65065868620113F759C5D37B89843A334E64D210
                                                                                      SHA-256:F7C8CEE9FA2A4BF9F41ABA18010236AC4CCD914ACCA9E568C87EDA0503D54014
                                                                                      SHA-512:B8E61E6D5057CD75D178B292CD19CBCED2A127099D95046A7448438BCC035DE4066FDD637E9055AC3914E4A8EAA1B0123FA0E90E4F7042B2C4551BB009F1D2E9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Asmera) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.83500517532947
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcxAQDcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DwNDBP
                                                                                      MD5:FCBE668127DFD81CB0F730C878EB2F1A
                                                                                      SHA1:F27C9D96A04A12AC7423A60A756732B360D6847D
                                                                                      SHA-256:6F462C2C5E190EFCA68E882CD61D5F3A8EF4890761376F22E9905B1B1B6FDE9F
                                                                                      SHA-512:B0E6E4F5B46A84C2D02A0519831B98F336AA79079FF2CB9F290D782335FB4FB39A3453520424ED3761D801B9FBE39228B1D045C40EDD70B29801C26592F9805A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Bamako) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.834042129935993
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2Dcx2m/2DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2Dw/2D4v
                                                                                      MD5:7A017656AB8048BD67250207CA265717
                                                                                      SHA1:F2BB86BC7B7AB886738A33ADA37C444D6873DB94
                                                                                      SHA-256:E31F69E16450B91D79798C1064FEA18DE89D5FE343D2DE4A5190BCF15225E69D
                                                                                      SHA-512:695FA7369341F1F4BC1B629CDAB1666BEFE2E7DB32D75E5038DC17526A3CCE293DB36AFEB0955B06F5834D43AEF140F7A66EC52598444DBE8C8B70429DBE5FC5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Bangui) $TZData(:Africa/Lagos).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.839691887198201
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2Dcx79FHp4DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2Dw7J4V
                                                                                      MD5:149DD4375235B088386A2D187ED03FFB
                                                                                      SHA1:5E879B778E2AB110AC7815D3D62A607A76AAB93B
                                                                                      SHA-256:1769E15721DAFF477E655FF7A8491F4954FB2F71496287C6F9ED265FE5588E00
                                                                                      SHA-512:4F997EDE6F04A89240E0950D605BB43D6814DCCA433F3A75F330FA13EE8729A10D20E9A0AAD6E6912370E350ABD5A65B878B914FCC9A5CA8503E3A5485E57B3E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Banjul) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):169
                                                                                      Entropy (8bit):4.797400281087303
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52Dc5ixXGm2OHGVkevUdSaw7FFFkhSVPVFd:SlSWB9X52D4fm2OHCkeVawBFF2mh
                                                                                      MD5:BA4959590575031330280A4ADC7017D1
                                                                                      SHA1:34FBC2AFD2E13575D286062050D98ABC4BF7C7A6
                                                                                      SHA-256:2C06A94A43AC7F0079E6FE371F0D5A06A7BF23A868AC3B10135BFC4266CD2D4E
                                                                                      SHA-512:65E6161CB6AF053B53C7ABE1E4CAAD4F40E350D52BADCB95EB37138268D17CF48DDB0CA771F450ECD8E6A57C99BE2E8C2227A28B5C4AF3DE7F6D74F255118F04
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Bissau) {. {-9223372036854775808 -3740 0 LMT}. {-1830380400 -3600 0 -01}. {157770000 0 0 GMT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):178
                                                                                      Entropy (8bit):4.856245693637169
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62Dc8ycXp75h4DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DAmp1T
                                                                                      MD5:3F6E187410D0109D05410EFC727FB5E5
                                                                                      SHA1:CAB54D985823218E01EDF9165CABAB7A984EE93E
                                                                                      SHA-256:9B2EEB0EF36F851349E254E1745D11B65CB30A16A2EE4A87004765688A5E0452
                                                                                      SHA-512:E12D6DBEA8DE9E3FB236011B962FFE1AEB95E3353B13303C343565B60AA664508D51A011C66C3CE2460C52A901495F46D0500C9B74E19399AE66231E5D6200A0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Blantyre) $TZData(:Africa/Maputo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):178
                                                                                      Entropy (8bit):4.853052123353996
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DciE0TMJZp4DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2D4qGp4e
                                                                                      MD5:4F5159996C16A171D9B011C79FDDBF63
                                                                                      SHA1:51BCA6487762E42528C845CCA33173B3ED707B3F
                                                                                      SHA-256:E73ADC4283ECA7D8504ABC6CB28D98EB071ED867F77DE9FADA777181533AD1D0
                                                                                      SHA-512:6E5D4DF903968395DFDB834FBD4B2A0294E945A9939D05BED8533674EA0ACE8393731DDCDFACF7F2C9A00D38DC8F5EDB173B4025CF05122B0927829D07ED203F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Brazzaville) $TZData(:Africa/Lagos).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.900915013374923
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DclbDcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DkbDE/
                                                                                      MD5:9E81B383C593422481B5066CF23B8CE1
                                                                                      SHA1:8DD0408272CBE6DF1D5051CB4D9319B5A1BD770E
                                                                                      SHA-256:9ADCD7CB6309049979ABF8D128C1D1BA35A02F405DB8DA8C39D474E8FA675E38
                                                                                      SHA-512:9939ED703EC26350DE9CC59BF7A8C76B6B3FE3C67E47CCDDE86D87870711224ADEEC61D93AC7926905351B8333AD01FF235276A5AB766474B5884F8A0329C2CB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Bujumbura) $TZData(:Africa/Maputo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3720
                                                                                      Entropy (8bit):3.687670811431724
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5hRg1oCSY0WF6yU0yWZVYbZ0F0ZeTvc0jDlSBFX84aKqITVuV09ONWHr0L0335Kw:Fu0oVy0FUeLIvQV8c0OvOakCUUO
                                                                                      MD5:1B38D083FC54E17D82935D400051F571
                                                                                      SHA1:AE34C08176094F4C4BFEB4E1BBAE6034BCD03A11
                                                                                      SHA-256:11283B69DE0D02EAB1ECF78392E3A4B32288CCFEF946F0432EC83327A51AEDDC
                                                                                      SHA-512:581161079EC0F77EEB119C96879FD586AE49997BAD2C5124C360BCACF9136FF0A6AD70AE7D4C88F96BC94EEB87F628E8890E65DB9B0C96017659058D35436307
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Cairo) {. {-9223372036854775808 7509 0 LMT}. {-2185409109 7200 0 EET}. {-929844000 10800 1 EEST}. {-923108400 7200 0 EET}. {-906170400 10800 1 EEST}. {-892868400 7200 0 EET}. {-875844000 10800 1 EEST}. {-857790000 7200 0 EET}. {-844308000 10800 1 EEST}. {-825822000 7200 0 EET}. {-812685600 10800 1 EEST}. {-794199600 7200 0 EET}. {-779853600 10800 1 EEST}. {-762663600 7200 0 EET}. {-399088800 10800 1 EEST}. {-386650800 7200 0 EET}. {-368330400 10800 1 EEST}. {-355114800 7200 0 EET}. {-336790800 10800 1 EEST}. {-323654400 7200 0 EET}. {-305168400 10800 1 EEST}. {-292032000 7200 0 EET}. {-273632400 10800 1 EEST}. {-260496000 7200 0 EET}. {-242096400 10800 1 EEST}. {-228960000 7200 0 EET}. {-210560400 10800 1 EEST}. {-197424000 7200 0 EET}. {-178938000 10800 1 EEST}. {-165801600 7200 0 EET}. {-147402000 10800 1 EEST}. {-134265600 72
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1567
                                                                                      Entropy (8bit):3.593430930151928
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5qSFbS4PUuMfMSAdZXfSGjX6JAzS26WZrW0SKQYXRWXpSjv:YmG0HZPcOQy1p
                                                                                      MD5:9DB3A6EB1162C5D814B98265FB58D004
                                                                                      SHA1:63ACAD6C18B49EF6794610ADED9865C8600A4D5C
                                                                                      SHA-256:EF30CFFD1285339F4CC1B655CB4CB8C5D864C4B575D66F18919A35C084AA4E5F
                                                                                      SHA-512:0581F6640BDDD8C33E82983F2186EB0952946C70A4B3F524EC78D1BE3EC1FA10BC3672A99CBA3475B28C0798D62A14F298207160F04EE0861EDDA352DA2BCCA0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Casablanca) {. {-9223372036854775808 -1820 0 LMT}. {-1773012580 0 0 +00}. {-956361600 3600 1 +00}. {-950490000 0 0 +00}. {-942019200 3600 1 +00}. {-761187600 0 0 +00}. {-617241600 3600 1 +00}. {-605149200 0 0 +00}. {-81432000 3600 1 +00}. {-71110800 0 0 +00}. {141264000 3600 1 +00}. {147222000 0 0 +00}. {199756800 3600 1 +00}. {207702000 0 0 +00}. {231292800 3600 1 +00}. {244249200 0 0 +00}. {265507200 3600 1 +00}. {271033200 0 0 +00}. {448243200 3600 0 +01}. {504918000 0 0 +00}. {1212278400 3600 1 +00}. {1220223600 0 0 +00}. {1243814400 3600 1 +00}. {1250809200 0 0 +00}. {1272758400 3600 1 +00}. {1281222000 0 0 +00}. {1301788800 3600 1 +00}. {1312066800 0 0 +00}. {1335664800 3600 1 +00}. {1342749600 0 0 +00}. {1345428000 3600 1 +00}. {1348970400 0 0 +00}. {1367114400 3600 1 +00}. {1373162400 0 0 +00}. {1376100000 3600
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7277
                                                                                      Entropy (8bit):3.744402699283941
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:/N8d9VA1URbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAT:/AHAiRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:261E339A2575F28099CD783B52F0980C
                                                                                      SHA1:F7EB8B3DAE9C07382D5123225B3EAA4B5BFD47D6
                                                                                      SHA-256:9C7D0E75AFC5681579D1018D7259733473EEDFFAF7313016B60159CB2A4DCAB5
                                                                                      SHA-512:8E622174CB6DB4D0172DBC2E408867F03EBB7D1D54AA51D99C4465945CFF369AAFAF17D1D0F9277E69CBE3AD6AAF9A0C6EE056017474DF171E94BD28BBA9C04A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Ceuta) {. {-9223372036854775808 -1276 0 LMT}. {-2177452800 0 0 WET}. {-1630112400 3600 1 WEST}. {-1616810400 0 0 WET}. {-1451692800 0 0 WET}. {-1442451600 3600 1 WEST}. {-1427673600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364774400 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333324800 0 0 WET}. {-1316390400 3600 1 WEST}. {-1301270400 0 0 WET}. {-1293840000 0 0 WET}. {-94694400 0 0 WET}. {-81432000 3600 1 WEST}. {-71110800 0 0 WET}. {141264000 3600 1 WEST}. {147222000 0 0 WET}. {199756800 3600 1 WEST}. {207702000 0 0 WET}. {231292800 3600 1 WEST}. {244249200 0 0 WET}. {265507200 3600 1 WEST}. {271033200 0 0 WET}. {448243200 3600 0 CET}. {504918000 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):180
                                                                                      Entropy (8bit):4.832452688412801
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcmMM1+DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DCM1+V
                                                                                      MD5:DC007D4B9C02AAD2DBD48E73624B893E
                                                                                      SHA1:9BEE9D21566D6C6D4873EFF9429AE3D3F85BA4E4
                                                                                      SHA-256:3BF37836C9358EC0ABD9691D8F59E69E8F6084A133A50650239890C458D4AA41
                                                                                      SHA-512:45D3BC383A33F7079A6D04079112FD73DB2DDBB7F81BFF8172FABCAA949684DC31C8B156E647F77AF8BA26581D3812D510C250CDC4D7EEEC788DDB2B77CD47E8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Conakry) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):178
                                                                                      Entropy (8bit):4.8075658510312484
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcXXMFBx/2DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DKXEB4
                                                                                      MD5:CDA180DB8DF825268DB06298815C96F0
                                                                                      SHA1:20B082082CFA0DF49C0DF4FD698EBD061280A2BB
                                                                                      SHA-256:95D31A4B3D9D9977CBDDD55275492A5A954F431B1FD1442C519255FBC0DBA615
                                                                                      SHA-512:2D35698DE3BF1E90AB37C84ED4E3D0B57F02555A8AEB98659717EEC1D5EED17044D446E12B5AAC12A9721A3F9667343C5CACD7AB00BF986285B8084FF9384654
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Dakar) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):186
                                                                                      Entropy (8bit):4.795449330458551
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2Dc8bEH+DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DJbVDkr
                                                                                      MD5:AF8E3E86312E3A789B82CECEDDB019CE
                                                                                      SHA1:6B353BAB18E897151BF274D6ACF410CDFF6F00F0
                                                                                      SHA-256:F39E4CABE33629365C2CEF6037871D698B942F0672F753212D768E865480B822
                                                                                      SHA-512:9891AA26C4321DD5C4A9466F2EE84B14F18D3FFD71D6E8D2DE5CAFE4DC563D85A934B7B4E55926B30181761EF8C9B6C97746F522718BAE9DCBE4BDDE70C42B53
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Dar_es_Salaam) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.779330261863059
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcRHKQ1BQDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DOrkDkr
                                                                                      MD5:1440C37011F8F31213AE5833A3FCD5E1
                                                                                      SHA1:9EEE9D7BB3A1E29EDDE90D7DBE63ED50513A909B
                                                                                      SHA-256:A4E0E775206EDBA439A454649A7AC94AE3AFEADC8717CBD47FD7B8AC41ADB06F
                                                                                      SHA-512:D82FF9C46C8845A6F15DC96AF8D98866C601EF0B4F7F5F0260AD571DD46931E90443FFEB5910D5805C5A43F6CC8866116066565646AE2C96E1D260999D1641F0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Djibouti) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.800219030063992
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DcnKe2DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2Dml2D4v
                                                                                      MD5:18C0C9E9D5154E20CC9301D5012066B9
                                                                                      SHA1:8395E917261467EC5C27034C980EDD05F2242F40
                                                                                      SHA-256:0595C402B8499FC1B67C196BEE24BCA4DE14D3E10B8DBBD2840D2B4C88D9DF28
                                                                                      SHA-512:C53540E25B76DF8EC3E2A5F27B473F1D6615BFBD043E133867F3391B057D8552350F912DF55DD11C1357765EF76D8E286BBBE839F28295D09751243DC0201BDF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Douala) $TZData(:Africa/Lagos).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1281
                                                                                      Entropy (8bit):3.6551425401331312
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQbe5T7pkNUSMSA7ZXgUSGjX6JAWqS26WZrW0SKQYJZRWXpSjv:5opMfMSA7ZXfSGjX6JAzS26WZrW0SKQm
                                                                                      MD5:8E9FF3CB18879B1C69A04F45715D24BB
                                                                                      SHA1:EF391BF1C3E1DEC08D8158B82B2FB0ED3E69866E
                                                                                      SHA-256:A6CFC4359B7E2D650B1851D805FF5CD4562D0D1253793EA0978819B9A2FCC0E2
                                                                                      SHA-512:6BFF03EE8973E2204181967987930EECDD39789DB353DB2EFC786027A8013CFF4835FAB9E3F0AF935D2A2D49CCEBE565FD481BA230EDF4D22A7848D4781C877C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/El_Aaiun) {. {-9223372036854775808 -3168 0 LMT}. {-1136070432 -3600 0 -01}. {198291600 0 0 +00}. {199756800 3600 1 +00}. {207702000 0 0 +00}. {231292800 3600 1 +00}. {244249200 0 0 +00}. {265507200 3600 1 +00}. {271033200 0 0 +00}. {1212278400 3600 1 +00}. {1220223600 0 0 +00}. {1243814400 3600 1 +00}. {1250809200 0 0 +00}. {1272758400 3600 1 +00}. {1281222000 0 0 +00}. {1301788800 3600 1 +00}. {1312066800 0 0 +00}. {1335664800 3600 1 +00}. {1342749600 0 0 +00}. {1345428000 3600 1 +00}. {1348970400 0 0 +00}. {1367114400 3600 1 +00}. {1373162400 0 0 +00}. {1376100000 3600 1 +00}. {1382839200 0 0 +00}. {1396144800 3600 1 +00}. {1403920800 0 0 +00}. {1406944800 3600 1 +00}. {1414288800 0 0 +00}. {1427594400 3600 1 +00}. {1434247200 0 0 +00}. {1437271200 3600 1 +00}. {1445738400 0 0 +00}. {1459044000 3600 1 +00}. {146509200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.817633094200984
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2Dcu5sp4DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2Dk4DBP
                                                                                      MD5:035B36DF91F67179C8696158F58D0CE8
                                                                                      SHA1:E43BFF33090324110048AC19CBA16C4ED8D8B3FE
                                                                                      SHA-256:3101942D9F3B2E852C1D1EA7ED85826AB9EA0F8953B9A0E6BAC32818A2EC9EDD
                                                                                      SHA-512:A7B52154C6085E5D234D6D658BA48D2C8EC093A429C3907BE7D16654F6EE9EBE8E3100187650956E5164B18340AB0C0979C1F4FA90EFE0CC423FBA5F14F45215
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Freetown) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):178
                                                                                      Entropy (8bit):4.8512443534123255
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DcHK0o/4DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DAV+4G
                                                                                      MD5:BA2C7443CFCB3E29DB84FEC16B3B3843
                                                                                      SHA1:2BA7D68C48A79000B1C27588A20A751AA04C5779
                                                                                      SHA-256:28C1453496C2604AA5C42A88A060157BDFE22F28EDD1FBC7CC63B02324ED8445
                                                                                      SHA-512:B275ABAADA7352D303EFEAD66D897BE3099A33B80EA849F9F1D98D522AA9A3DC44E1D979C0ABF2D7886BACF2F86D25837C971ECE6B2AF731BE2EE0363939CBDE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Gaborone) $TZData(:Africa/Maputo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):176
                                                                                      Entropy (8bit):4.835896095919456
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62Dc0B5h4DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62Dlfh4G
                                                                                      MD5:59137CFDB8E4B48599FB417E0D8A4A70
                                                                                      SHA1:F13F9932C0445911E395377FB51B859E4F72862A
                                                                                      SHA-256:E633C6B619782DA7C21D548E06E6C46A845033936346506EA0F2D4CCCDA46028
                                                                                      SHA-512:2DCEB9A9FA59512ADCDE4946F055718A8C8236A912F6D521087FC348D52FFF462B5712633FDA5505876C500F5FD472381B3AC90CF1AEDF0C96EA08E0A0D3B7BA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Harare) $TZData(:Africa/Maputo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):298
                                                                                      Entropy (8bit):4.638948195674004
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52DWbAm2OHePP1mXs0//HF20706VcF206KsF:MBp52DWkmdHePP1mcUvFxJVcFEKsF
                                                                                      MD5:256740512DCB35B4743D05CC24C636DB
                                                                                      SHA1:1FD418712B3D7191549BC0808CF180A682AF7FC1
                                                                                      SHA-256:768E9B2D9BE96295C35120414522FA6DD3EDA4500FE86B6D398AD452CAF6FA4B
                                                                                      SHA-512:DCFF6C02D1328297BE24E0A640F5823BFD23BDE67047671AC18EB0B1F450C717E273B27A48857F54A18D6877AB8132AAED94B2D87D2F962DA43FE473FC3DDC94
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Johannesburg) {. {-9223372036854775808 6720 0 LMT}. {-2458173120 5400 0 SAST}. {-2109288600 7200 0 SAST}. {-860976000 10800 1 SAST}. {-845254800 7200 0 SAST}. {-829526400 10800 1 SAST}. {-813805200 7200 0 SAST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1059
                                                                                      Entropy (8bit):3.9545766161038602
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQresZkn0Vb0iluy8pLXeKXhCvN9U0TlW50qCPR8jYJRFp0Q8SdAri/8+u8Wb2:5on010ilux1XeKXhCvN9U0TMGqCp8jYH
                                                                                      MD5:79FCA072C6AABA65FB2DC83F33BFA17E
                                                                                      SHA1:AC86AA9B0EAACAB1E4FDB14AECD8D884F8329A5A
                                                                                      SHA-256:C084565CC6C217147C00DCA7D885AC917CFC8AF4A33CBA146F28586AD6F9832C
                                                                                      SHA-512:9F19DEA8E21CE3D3DCA0AFC5588203DBB6F5A13BBE10CFDA0CEBE4A417384B85DB3BFFC48687EF7AD27268715FC154E235C106EC91875BA646C6759D285F1027
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Juba) {. {-9223372036854775808 7588 0 LMT}. {-1230775588 7200 0 CAT}. {10360800 10800 1 CAST}. {24786000 7200 0 CAT}. {41810400 10800 1 CAST}. {56322000 7200 0 CAT}. {73432800 10800 1 CAST}. {87944400 7200 0 CAT}. {104882400 10800 1 CAST}. {119480400 7200 0 CAT}. {136332000 10800 1 CAST}. {151016400 7200 0 CAT}. {167781600 10800 1 CAST}. {182552400 7200 0 CAT}. {199231200 10800 1 CAST}. {214174800 7200 0 CAT}. {230680800 10800 1 CAST}. {245710800 7200 0 CAT}. {262735200 10800 1 CAST}. {277246800 7200 0 CAT}. {294184800 10800 1 CAST}. {308782800 7200 0 CAT}. {325634400 10800 1 CAST}. {340405200 7200 0 CAT}. {357084000 10800 1 CAST}. {371941200 7200 0 CAT}. {388533600 10800 1 CAST}. {403477200 7200 0 CAT}. {419983200 10800 1 CAST}. {435013200 7200 0 CAT}. {452037600 10800 1 CAST}. {466635600 7200 0 CAT}. {483487200 10800 1 CAST
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):180
                                                                                      Entropy (8bit):4.787605387034664
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcJEl2DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DIEl2Dkr
                                                                                      MD5:8CF1CA04CD5FC03D3D96DC49E98D42D4
                                                                                      SHA1:4D326475E9216089C872D5716C54DEB94590FCDE
                                                                                      SHA-256:A166E17E3A4AB7C5B2425A17F905484EBFDBA971F88A221155BCA1EC5D28EA96
                                                                                      SHA-512:1301B9469ED396198A2B87CBA254C66B148036C0117D7D4A8286CB8729296AD735DF16581AEF0715CEE24213E91970F181824F3A64BCF91435FDAD85DCD78C84
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Kampala) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1091
                                                                                      Entropy (8bit):3.9616554773567083
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQWe9hXn0Vb0iluy8pLXeKXhCvN9U0TlW50qCPR8jYJRFp0Q8SdAri/8+u8WbVgM:5vn010ilux1XeKXhCvN9U0TMGqCp8jYs
                                                                                      MD5:A00B0C499DE60158C9990CFE9628FEA4
                                                                                      SHA1:44B768C63E170331396B4B81ABF0E3EDD8B0D864
                                                                                      SHA-256:FCFF440D525F3493447C0ACFE32BB1E8BCDF3F1A20ADC3E0F5D2B245E2DB10E9
                                                                                      SHA-512:30BF22857AA4C26FC6178C950AB6EAB472F2AC77D2D8EB3A209DCDEF2DDC8312B0AB6DA3428936CA16225ABE652DDB8536D870DB1905027AD7BD7FF245871556
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Khartoum) {. {-9223372036854775808 7808 0 LMT}. {-1230775808 7200 0 CAT}. {10360800 10800 1 CAST}. {24786000 7200 0 CAT}. {41810400 10800 1 CAST}. {56322000 7200 0 CAT}. {73432800 10800 1 CAST}. {87944400 7200 0 CAT}. {104882400 10800 1 CAST}. {119480400 7200 0 CAT}. {136332000 10800 1 CAST}. {151016400 7200 0 CAT}. {167781600 10800 1 CAST}. {182552400 7200 0 CAT}. {199231200 10800 1 CAST}. {214174800 7200 0 CAT}. {230680800 10800 1 CAST}. {245710800 7200 0 CAT}. {262735200 10800 1 CAST}. {277246800 7200 0 CAT}. {294184800 10800 1 CAST}. {308782800 7200 0 CAT}. {325634400 10800 1 CAST}. {340405200 7200 0 CAT}. {357084000 10800 1 CAST}. {371941200 7200 0 CAT}. {388533600 10800 1 CAST}. {403477200 7200 0 CAT}. {419983200 10800 1 CAST}. {435013200 7200 0 CAT}. {452037600 10800 1 CAST}. {466635600 7200 0 CAT}. {483487200 10800 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):176
                                                                                      Entropy (8bit):4.8623059127375585
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DcCJRx+DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DRX+Da
                                                                                      MD5:32AE0D7A7E7F0DF7AD0054E959A53B09
                                                                                      SHA1:AE455C96401EBB1B2BDE5674A71A182D9E12D7BD
                                                                                      SHA-256:7273FA039D250CABAE2ACCE926AB483B0BF16B0D77B9C2A7B499B9BDFB9E1CBB
                                                                                      SHA-512:DC8E89A75D7212D398A253E6FF3D10AF72B7E14CBC07CA53C6CB01C8CE40FB12375E50AD4291C973C872566F8D875D1E1A2CF0A38F02C91355B957095004563E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Kigali) $TZData(:Africa/Maputo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):175
                                                                                      Entropy (8bit):4.816805447465336
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DcqQFeDcGev:SlSWB9IZaM3y7V4FVAIgNT9L2DdD4v
                                                                                      MD5:90EC372D6C8677249C8C2841432F0FB7
                                                                                      SHA1:5D5E549496962420F56897BC01887B09EC863D78
                                                                                      SHA-256:56F7CA006294049FA92704EDEAD78669C1E9EABE007C41F722E972BE2FD58A37
                                                                                      SHA-512:93FD7C8F5C6527DCCFBF21043AB5EED21862A22DA1FDB3ED7635723060C9252D76541DAD3A76EBF8C581A82A6DBEF2766DD428ACE3A9D6A45954A787B686B1CA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Kinshasa) $TZData(:Africa/Lagos).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):141
                                                                                      Entropy (8bit):4.965079502032549
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52DcGemFFkXGm2OHWTdvUQDWTFWZRYvCn:SlSWB9X52D4mFJm2OHWTdRDWTGRLn
                                                                                      MD5:51D7AC832AE95CFDE6098FFA6FA2B1C7
                                                                                      SHA1:9DA61FDA03B4EFDA7ACC3F83E8AB9495706CCEF1
                                                                                      SHA-256:EEDA5B96968552C12B916B39217005BF773A99CA17996893BC87BCC09966B954
                                                                                      SHA-512:128C8D3A0AA7CF4DFAE326253F236058115028474BF122F14AB9461D910A03252FEEB420014CA91ACFBF94DF05FBFCADE98217FC59A86A2581BB68CDC83E88C8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Lagos) {. {-9223372036854775808 816 0 LMT}. {-1588464816 3600 0 WAT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):177
                                                                                      Entropy (8bit):4.816649832558406
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2Dcr7bp4DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2Dgfp4Di
                                                                                      MD5:D1387B464CFCFE6CB2E10BA82D4EEE0E
                                                                                      SHA1:F672B694551AB4228D4FC938D0CC2DA635EB8878
                                                                                      SHA-256:BEE63E4DF9D03D2F5E4100D0FCF4E6D555173083A4470540D4ADC848B788A2FC
                                                                                      SHA-512:DEB95AAB852772253B60F83DA9CE5E24144386DFBFB1F1E9A77905511181EC84FD13B00200602D6C276820527206EE0078DDE81CC0F1B1276B8BF4360C2CDB1E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Libreville) $TZData(:Africa/Lagos).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):177
                                                                                      Entropy (8bit):4.813464796454866
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2Dcih4DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DNh4DB
                                                                                      MD5:D2AA823E78DD8E0A0C83508B6378DE5D
                                                                                      SHA1:C26E03EF84C3C0B6001F0D4471907A94154E6850
                                                                                      SHA-256:345F3F9422981CC1591FBC1B5B17A96F2F00F0C191DF23582328D44158041CF0
                                                                                      SHA-512:908F8D096DA6A336703E7601D03477CECBCDC8D404C2410C7F419986379A14943BB61B0D92D87160D5F1EF5B229971B2B9D122D2B3F70746CED0D4D6B10D7412
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Lome) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.807298951345495
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DccLtBQDcGev:SlSWB9IZaM3y7V4FVAIgNT9L2DXQD4v
                                                                                      MD5:E851465BCA70F325B0B07E782D6A759E
                                                                                      SHA1:3B3E0F3FD7AF99F941A3C70A2A2564C9301C8CFB
                                                                                      SHA-256:F7E1DCBAE881B199F2E2BF18754E145DDED230518C691E7CB34DAE3C922A6063
                                                                                      SHA-512:5F655B45D7A16213CE911EDAD935C1FEE7A947C0F5157CE20712A00B2A12A34AE51D5C05A392D2FF3A0B2DA7787D6C614FF100DDE7788CA01AAE21F10DD1CC3A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Luanda) $TZData(:Africa/Lagos).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):180
                                                                                      Entropy (8bit):4.893308860167744
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DcfpT0DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62D8pT0G
                                                                                      MD5:CD638B7929FB8C474293D5ECF1FE94D3
                                                                                      SHA1:149AD0F3CF8AC1795E84B97CFF5CEB1FD26449C4
                                                                                      SHA-256:41D32824F28AE235661EE0C959E0F555C44E3E78604D6D2809BBA2254FD47258
                                                                                      SHA-512:D762C49B13961A01526C0DD9D7A55E202448E1B46BA64F701FB2E0ABE0F44B2C3DF743864B9E62DC07FD6CEA7197945CE246C89CDACB1FEC0F924F3ECC46B170
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Lubumbashi) $TZData(:Africa/Maputo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):176
                                                                                      Entropy (8bit):4.857012096036922
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsfKGyVAIgNGEjKKW62DcOf+DcfKu:SlSWB9IZaM3y7fYVAIgNTj5W62DkDE/
                                                                                      MD5:3769866ADC24DA6F46996E43079C3545
                                                                                      SHA1:546FA9C76A1AE5C6763B31FC7214B8A2B18C3C52
                                                                                      SHA-256:5BAF390EA1CE95227F586423523377BABD141F0B5D4C31C6641E59C6E29FFAE0
                                                                                      SHA-512:DEA8CAB330F6321AD9444DB9FEC58E2CBCC79404B9E5539EABB52DBC9C3AC01BA1E8A3E1EC32906F02E4E4744271D84B626A5C32A8CD8B22210C42DD0E774A9C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Maputo)]} {. LoadTimeZoneFile Africa/Maputo.}.set TZData(:Africa/Lusaka) $TZData(:Africa/Maputo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.807416212132411
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2Dcn2DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2D42D4v
                                                                                      MD5:37C13E1D11C817BA70DDC84E768F8891
                                                                                      SHA1:0765A45CC37EB71F4A5D2B8D3359AEE554C647FF
                                                                                      SHA-256:8F4F0E1C85A33E80BF7C04CF7E0574A1D829141CC949D2E38BDCC174337C5BAE
                                                                                      SHA-512:1E31BBA68E85A8603FBDD27DA68382CBC6B0E1AB0763E86516D3EFD15CFF106DE02812756F504AEE799BF6742423DF5732352D488B3F05B889BE5E48594F558D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Malabo) $TZData(:Africa/Lagos).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):143
                                                                                      Entropy (8bit):4.906945970372021
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52DcfKUXGm2OHoVvXdSF2iv:SlSWB9X52DESm2OHoVPdM
                                                                                      MD5:5497C01E507E7C392944946FCD984852
                                                                                      SHA1:4C3FD215E931CE36FF095DD9D23165340D6EECFE
                                                                                      SHA-256:C87A6E7B3B84CFFA4856C4B6C37C5C8BA5BBB339BDDCD9D2FD34CF17E5553F5D
                                                                                      SHA-512:83A2AA0ED1EB22056FFD3A847FB63DD09302DA213FE3AB660C41229795012035B5EA64A3236D3871285A8E271458C2DA6FCD599E5747F2F842E742C11222671A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Maputo) {. {-9223372036854775808 7820 0 LMT}. {-2109291020 7200 0 CAT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):194
                                                                                      Entropy (8bit):4.91873415322653
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7HbsvFVAIgNTzbDJL2DZQs+DWbBn:MBaIMaHw4NHnJL2DZiDWt
                                                                                      MD5:71A4197C8062BBFCCC62DCEFA87A25F9
                                                                                      SHA1:7490FAA5A0F5F20F456E71CBF51AA6DEB1F1ACC8
                                                                                      SHA-256:4B33414E2B59E07028E9742FA4AE34D28C08FD074DDC6084EDB1DD179198B3C1
                                                                                      SHA-512:A71CCB957FB5102D493320F48C94ADB642CCAA5F7F28BDDE05D1BB175C29BCBAC4D19DBC481AC0C80CE48F8E3840746C126CBC9CE511CA48D4E53DE22B3D66E7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Johannesburg)]} {. LoadTimeZoneFile Africa/Johannesburg.}.set TZData(:Africa/Maseru) $TZData(:Africa/Johannesburg).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):195
                                                                                      Entropy (8bit):4.911369740193625
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7HbsvFVAIgNTzbDJL2DzjEHp4DWbBn:MBaIMaHw4NHnJL2DzjEJ4DWt
                                                                                      MD5:8F4C02CE326FAEEBD926F94B693BFF9E
                                                                                      SHA1:9E8ABB12E4CFE341F24F5B050C75DDE3D8D0CB53
                                                                                      SHA-256:029AD8C75A779AED71FD233263643DADE6DF878530C47CF140FC8B7755DDA616
                                                                                      SHA-512:4B7D2D1D8DA876ABCD1E44FD5E4C992287F2B62B7C7BC3D6FD353E6312053F6762DBD11C0F27056EF8E37C8A2AF8E5111CF09D4EB6BB32EC1FF77F4C0C37917B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Johannesburg)]} {. LoadTimeZoneFile Africa/Johannesburg.}.set TZData(:Africa/Mbabane) $TZData(:Africa/Johannesburg).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):182
                                                                                      Entropy (8bit):4.828470940863702
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt2DcBEBXCEeDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL2DFSVDkr
                                                                                      MD5:B686E9408AB6EC58F3301D954A068C7E
                                                                                      SHA1:C1259C31F93EB776F0F401920F076F162F3FFB2D
                                                                                      SHA-256:79DB89294DAE09C215B9F71C61906E49AFAA5F5F27B4BC5B065992A45B2C183D
                                                                                      SHA-512:CF96C687D33E68EB498A63EC262FC968858504410F670C6F492532F7C22F507BEACD41888B0A7527C30974DC545CCA9C015898E2D7C0C6D14C14C88F8BBED5C5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Africa/Mogadishu) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):200
                                                                                      Entropy (8bit):4.81604007062907
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52D3NwTm2OHrFGxYPlHIgafTwG5B:MBp52D3NwTmdHhmYPdIgar5B
                                                                                      MD5:8F9D1916FF86E2F8C5C9D4ABCC405D53
                                                                                      SHA1:286BFEC8F7CE6729F84FD6CFEE6A40B7277A4DFF
                                                                                      SHA-256:182F2608422FF14C53DC8AC1EDFFE054AE011275C1B5C2423E286AD95910F44C
                                                                                      SHA-512:7EEF6840E54313EF1127694F550986BF97BB1C8BD51DED0AB6D5842B74B5BF0406C65B293F1106E69DDFA0B01AD46756492DEDD9ECCBD077BB75FDA95A9E1912
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Monrovia) {. {-9223372036854775808 -2588 0 LMT}. {-2776979812 -2588 0 MMT}. {-1604359012 -2670 0 MMT}. {63593070 0 0 GMT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):235
                                                                                      Entropy (8bit):4.70181156382821
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52DkWJm2OHsvT5X26V/7VVpVCgekKB9TQ4U/w:MBp52DdJmdHsvVXHVVnmQ4U/w
                                                                                      MD5:B6562D5A53E05FAAD80671C88A9E01D3
                                                                                      SHA1:0014B14CFDDE47E603962935F8297C4C46533084
                                                                                      SHA-256:726980DCC13E0596094E01B8377E17029A2FCCE6FE93538C61E61BA620DD0971
                                                                                      SHA-512:D9C2838C89B0537C7F7A7319600D69D09AC004BD72358B452425A3B4861140246F71A94F004C2EF739620E81062F37ED9DA6D518F74956630006DD5674925A63
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Nairobi) {. {-9223372036854775808 8836 0 LMT}. {-1309746436 10800 0 EAT}. {-1262314800 9000 0 +0230}. {-946780200 9900 0 +0245}. {-315629100 10800 0 EAT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):200
                                                                                      Entropy (8bit):4.8064239600480985
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52DjXm2OHNseVaxCXGFaS1HkFWTvLn:MBp52DjXmdHPVX8aS2yzn
                                                                                      MD5:459DA3ECBE5C32019D1130DDEAB10BAA
                                                                                      SHA1:DD1F6653A7B7B091A57EC59E271197CEC1892594
                                                                                      SHA-256:F36F8581755E1B40084442C43C60CC904C908285C4D719708F2CF1EADB778E2E
                                                                                      SHA-512:FF74D540157DE358E657E968C9C040B8FE5C806D22782D878575BFAC68779303E6071DC84D6773BC06D299AC971B0EB6B38CA50439161574B5A50FF6F1704046
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Ndjamena) {. {-9223372036854775808 3612 0 LMT}. {-1830387612 3600 0 WAT}. {308703600 7200 1 WAST}. {321314400 3600 0 WAT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.822255424633636
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DcdhA9Ff2DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2Dsh2f2e
                                                                                      MD5:3142A6EAC3F36C872E7C32F8AF43A0F8
                                                                                      SHA1:0EACF849944A55D4AB8198DDD0D3C5494D1986DA
                                                                                      SHA-256:1704A1A82212E6DB71DA54E799D81EFA3279CD53A6BFA980625EE11126603B4C
                                                                                      SHA-512:BB3DADC393D0CF87934629BBFAFAD3AD9149B80843FC5447670812357CC4DFBCAF71F7104EBF743C06517BB42111B0DB9028B22F401A50E17085431C9200DAB2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Niamey) $TZData(:Africa/Lagos).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):183
                                                                                      Entropy (8bit):4.862257004762335
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcboGb+DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2Dqbb+V
                                                                                      MD5:6849FA8FFC1228286B08CE0950FEB4DD
                                                                                      SHA1:7F8E8069BA31E2E549566011053DA01DEC5444E9
                                                                                      SHA-256:2071F744BC880E61B653E2D84CED96D0AD2485691DDE9FFD38D3063B91E4F41F
                                                                                      SHA-512:30211297C2D8255D4B5195E9781931861A4DF55C431FFC6F83FE9C00A0089ED56179C07D33B1376C5DE8C0A9ABF2CFE473EF32AD14239DFD9599EA66BC286556
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Nouakchott) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.872638989714255
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcXCZDcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2D1DBP
                                                                                      MD5:7FF39BAAF47859EE3CD60F3E2C6DFC7D
                                                                                      SHA1:5CFC8B14222554156985031C7E9507CE3311F371
                                                                                      SHA-256:47E40BDBAC36CDB847C2E533B9D58D09FE1DBA2BED49C49BC75DD9086A63C6EB
                                                                                      SHA-512:DEEA0982593AE7757E70BD2E933B20B65CD9613891DC734AA4E6EC14D12AD119D2C69BA38E6FA4AE836C6CE14E57F35AE7F53345ACA4CF70AD67680E49BC6B7C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Ouagadougou) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):177
                                                                                      Entropy (8bit):4.845403930433216
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsGe4FVAIgNGESIRL2DcyTKM0DcGev:SlSWB9IZaM3y7V4FVAIgNT9L2DQD4v
                                                                                      MD5:9A4C8187E8AC86B1CF4177702A2D933A
                                                                                      SHA1:6B54BBBE6D7ABC780EE11922F3AC50CDE3740A1F
                                                                                      SHA-256:6292CC41FE34D465E3F38552BDE22F456E16ABCBAC0E0B813AE7566DF3725E83
                                                                                      SHA-512:8008DB5E6F4F8144456021BB6B112B24ADB1194B1D544BBCB3E101E0684B63F4673F06A264C651A4BC0296CB81F7B4D73D47EAC7E1EC98468908E8B0086B2DDD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Lagos)]} {. LoadTimeZoneFile Africa/Lagos.}.set TZData(:Africa/Porto-Novo) $TZData(:Africa/Lagos).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):200
                                                                                      Entropy (8bit):4.8463501042309645
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52DcOFwFkXGm2OHzT5vXbeaFnvUdSa5FF1IEvWZvZYvCn:SlSWB9X52DIJm2OHH5PzdVacbLn
                                                                                      MD5:D28C0D0628DE3E5D9662A3376B20D5B4
                                                                                      SHA1:464351F257655F10732CA9A1E59CF6587B33F8A1
                                                                                      SHA-256:B9F317EAA504A195BD658BA7EE9EE22D816BF46A1FFDB8D8DA573D311A5FF78A
                                                                                      SHA-512:B056E7A16CE8E5CC420F88AF26E893348117306D66ED2DF4C6A6C2CA9F48783714E08AACF94BC646A1B4A2B3FB2080A4E53EDF4633C9AE259BBBA3F8ABE4DEE3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Sao_Tome) {. {-9223372036854775808 1616 0 LMT}. {-2713912016 -2205 0 LMT}. {-1830384000 0 0 GMT}. {1514768400 3600 0 WAT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.85737401659099
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2DcHdDcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2DwdDBP
                                                                                      MD5:AF295B9595965712D77952D692F02C6B
                                                                                      SHA1:BC6737BD9BFD52FE538376A1441C59FB4FC1A038
                                                                                      SHA-256:13A06D69AEB38D7A2D35DF3802CEE1A6E15FA1F5A6648328A9584DD55D11E58C
                                                                                      SHA-512:E47C5EA2DFBC22CF9EAC865F67D01F5593D3CDDB51FDE24CDD13C8957B70F50111675D8E94CA859EC9B6FAA109B3EFA522C3985A69FE5334156FEE66B607006E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Africa/Timbuktu) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):920
                                                                                      Entropy (8bit):4.074538534246205
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52D0mdHrjWC+fGZni8hRSUNvoTC3yJ/Z9vPdq8UwLVFoBZdEthEK7st5kS1R:cQIevhR5FNgTbJ3b3D0WeXR
                                                                                      MD5:A53F5CD6FE7C2BDD8091E38F26EEA4D1
                                                                                      SHA1:90FB5EE343FCC78173F88CA59B35126CC8C07447
                                                                                      SHA-256:D2FCC1AD3BFE20954795F2CDFFFE96B483E1A82640B79ADAA6062B96D143E3C7
                                                                                      SHA-512:965E42972994AE79C9144323F87C904F393BA0CDF75186C346DA77CFAA1A2868C68AF8F2F1D63D5F06C5D1D4B96BA724DD4BC0DF7F5C4BD77E379AA674AE12DA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Tripoli) {. {-9223372036854775808 3164 0 LMT}. {-1577926364 3600 0 CET}. {-574902000 7200 1 CEST}. {-512175600 7200 1 CEST}. {-449888400 7200 1 CEST}. {-347158800 7200 0 EET}. {378684000 3600 0 CET}. {386463600 7200 1 CEST}. {402271200 3600 0 CET}. {417999600 7200 1 CEST}. {433807200 3600 0 CET}. {449622000 7200 1 CEST}. {465429600 3600 0 CET}. {481590000 7200 1 CEST}. {496965600 3600 0 CET}. {512953200 7200 1 CEST}. {528674400 3600 0 CET}. {544230000 7200 1 CEST}. {560037600 3600 0 CET}. {575852400 7200 1 CEST}. {591660000 3600 0 CET}. {607388400 7200 1 CEST}. {623196000 3600 0 CET}. {641775600 7200 0 EET}. {844034400 3600 0 CET}. {860108400 7200 1 CEST}. {875919600 7200 0 EET}. {1352505600 3600 0 CET}. {1364515200 7200 1 CEST}. {1382662800 7200 0 EET}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1072
                                                                                      Entropy (8bit):4.074604685883076
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52DgmdHjPbwSRjneMVyDKCNFWLFyBXS9/3S3K/CBmvyncSuZSqLS2C6oPwVFD:cQUejbwSRyS2Uyc+FcJLKgzmcx9b
                                                                                      MD5:1899EDCB30CDDE3A13FB87C026CD5D87
                                                                                      SHA1:4C7E25A36E0A62F3678BCD720FCB8911547BAC8D
                                                                                      SHA-256:F0E01AA40BB39FE64A2EB2372E0E053D59AA65D64496792147FEFBAB476C4EC3
                                                                                      SHA-512:FD22A2A7F9F8B66396152E27872CCBA6DA967F279BAF21BC91EF76E86B59505B3C21D198032B853427D9FFAB394FBB570F849B257D6F6821916C9AB29E7C37A1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Tunis) {. {-9223372036854775808 2444 0 LMT}. {-2797202444 561 0 PMT}. {-1855958961 3600 0 CET}. {-969242400 7200 1 CEST}. {-950493600 3600 0 CET}. {-941940000 7200 1 CEST}. {-891136800 3600 0 CET}. {-877827600 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-842918400 3600 0 CET}. {-842223600 7200 1 CEST}. {-828230400 3600 0 CET}. {-812502000 7200 1 CEST}. {-796269600 3600 0 CET}. {-781052400 7200 1 CEST}. {-766634400 3600 0 CET}. {231202800 7200 1 CEST}. {243903600 3600 0 CET}. {262825200 7200 1 CEST}. {276044400 3600 0 CET}. {581122800 7200 1 CEST}. {591145200 3600 0 CET}. {606870000 7200 1 CEST}. {622594800 3600 0 CET}. {641516400 7200 1 CEST}. {654649200 3600 0 CET}. {1114902000 7200 1 CEST}. {1128038400 3600 0 CET}. {1143334800 7200 1 CEST}. {1162083600 3600 0 CET}. {1174784400 7200 1 CEST}. {1193533200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1591
                                                                                      Entropy (8bit):3.915421470240155
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5qtCmcMxTFD9nJivm/8ySy/tnwfn8OIxJJSV1AnNlKQmX0UTjJx2MgXgprKfks1/:QCj6tXww023zn/
                                                                                      MD5:18BD78EB14E153DAAAAE70B0A6A2510C
                                                                                      SHA1:A91BA216A2AB62B138B1F0247D75FBA14A5F05C0
                                                                                      SHA-256:639A57650A4EA5B866EAAA2EEC0562233DC92CF9D6955AC387AD954391B850B1
                                                                                      SHA-512:88F34732F843E95F2A2AD4FAA0B5F945DD69B65FDDB4BB7DD957B95283B7AE995F52050B45A6332864C1C5CC4611390F6827D82569D343B5E1B9DDFE0AE5A633
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Africa/Windhoek) {. {-9223372036854775808 4104 0 LMT}. {-2458170504 5400 0 +0130}. {-2109288600 7200 0 SAST}. {-860976000 10800 1 SAST}. {-845254800 7200 0 SAST}. {637970400 7200 0 CAT}. {764200800 3600 1 WAT}. {778640400 7200 0 CAT}. {796780800 3600 1 WAT}. {810090000 7200 0 CAT}. {828835200 3600 1 WAT}. {841539600 7200 0 CAT}. {860284800 3600 1 WAT}. {873594000 7200 0 CAT}. {891734400 3600 1 WAT}. {905043600 7200 0 CAT}. {923184000 3600 1 WAT}. {936493200 7200 0 CAT}. {954633600 3600 1 WAT}. {967942800 7200 0 CAT}. {986083200 3600 1 WAT}. {999392400 7200 0 CAT}. {1018137600 3600 1 WAT}. {1030842000 7200 0 CAT}. {1049587200 3600 1 WAT}. {1062896400 7200 0 CAT}. {1081036800 3600 1 WAT}. {1094346000 7200 0 CAT}. {1112486400 3600 1 WAT}. {1125795600 7200 0 CAT}. {1143936000 3600 1 WAT}. {1157245200 7200 0 CAT}. {1175385600 3600 1 WAT}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8171
                                                                                      Entropy (8bit):3.783938143940452
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:DGWQm82ctfc/TVu7pAmKABmAlJD1NPaTsrEe50IC:DGWQm67pAmKABmiD1R2sG
                                                                                      MD5:DD838D2C8CF84B775BBCBA7868E7FFB5
                                                                                      SHA1:509CFC15E2CBFC2F183B4A3CDEC42C8427EBA825
                                                                                      SHA-256:01A88ADE038DDD264B74ED921441642CAA93830CEF9594F70188CCF6D19C4664
                                                                                      SHA-512:9D520CADC0134E7812B5643311246CED011A22D50240A03260478C90B69EC325AE5BD7548BA266E00253AC3288605A912C5DBB026EA1516CB2030F302BFCDF0E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Adak) {. {-9223372036854775808 44002 0 LMT}. {-3225223727 -42398 0 LMT}. {-2188944802 -39600 0 NST}. {-883573200 -39600 0 NST}. {-880196400 -36000 1 NWT}. {-769395600 -36000 1 NPT}. {-765374400 -39600 0 NST}. {-757342800 -39600 0 NST}. {-86878800 -39600 0 BST}. {-31496400 -39600 0 BST}. {-21466800 -36000 1 BDT}. {-5745600 -39600 0 BST}. {9982800 -36000 1 BDT}. {25704000 -39600 0 BST}. {41432400 -36000 1 BDT}. {57758400 -39600 0 BST}. {73486800 -36000 1 BDT}. {89208000 -39600 0 BST}. {104936400 -36000 1 BDT}. {120657600 -39600 0 BST}. {126709200 -36000 1 BDT}. {152107200 -39600 0 BST}. {162392400 -36000 1 BDT}. {183556800 -39600 0 BST}. {199285200 -36000 1 BDT}. {215611200 -39600 0 BST}. {230734800 -36000 1 BDT}. {247060800 -39600 0 BST}. {262789200 -36000 1 BDT}. {278510400 -39600 0 BST}. {294238800 -36000 1 BDT}. {309960000 -3
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8410
                                                                                      Entropy (8bit):3.882284820226162
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:RWFxXw34N+YXSUKC8aaIqDPRs/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:Rsd6M/4h5sBPy+CMt/ElALLVuAH
                                                                                      MD5:30468928CFDD0B6AAC8EA5BF84956E21
                                                                                      SHA1:0B146D4D789CD49F0A7FEDFFE85FFD31C0926D9C
                                                                                      SHA-256:202A45DEBFD6E92EF21E2FFF37281C1DE5B4AF4C79DC59A642013EBB37FE5AF0
                                                                                      SHA-512:721049A2C751BC3F90B0D757C85F59971B46C70942B2F8A20B0E0E0834B89BBE9A5F16D20AEB5F58C1B6268D71DD5F39F9135C60FDE692E3E472598E054C1D96
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Anchorage) {. {-9223372036854775808 50424 0 LMT}. {-3225223727 -35976 0 LMT}. {-2188951224 -36000 0 AST}. {-883576800 -36000 0 AST}. {-880200000 -32400 1 AWT}. {-769395600 -32400 1 APT}. {-765378000 -36000 0 AST}. {-86882400 -36000 0 AHST}. {-31500000 -36000 0 AHST}. {-21470400 -32400 1 AHDT}. {-5749200 -36000 0 AHST}. {9979200 -32400 1 AHDT}. {25700400 -36000 0 AHST}. {41428800 -32400 1 AHDT}. {57754800 -36000 0 AHST}. {73483200 -32400 1 AHDT}. {89204400 -36000 0 AHST}. {104932800 -32400 1 AHDT}. {120654000 -36000 0 AHST}. {126705600 -32400 1 AHDT}. {152103600 -36000 0 AHST}. {162388800 -32400 1 AHDT}. {183553200 -36000 0 AHST}. {199281600 -32400 1 AHDT}. {215607600 -36000 0 AHST}. {230731200 -32400 1 AHDT}. {247057200 -36000 0 AHST}. {262785600 -32400 1 AHDT}. {278506800 -36000 0 AHST}. {294235200 -32400 1 AHDT}. {309956400 -360
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):203
                                                                                      Entropy (8bit):4.9101657646476164
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290/8J5290e/:MBaIMY9QpI290/8m90O
                                                                                      MD5:F7D915076ABE4FF032E13F8769D38433
                                                                                      SHA1:F930A8943E87105EE8523F640EA6F65BD4C9CE78
                                                                                      SHA-256:9D368458140F29D95CAB9B5D0259DE27B52B1F2E987B4FA1C12F287082F4FE56
                                                                                      SHA-512:63C99FFA65F749B7637D0DF5A73A21AC34DFEAD364479DE992E215258A82B9C15AB0D45AAF29BD2F259766346FDB901412413DD44C5D45BB8DF6B582C34F48B3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Anguilla) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):202
                                                                                      Entropy (8bit):4.90033942341457
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290//MFe90e/:MBaIMY9QpI290//V90O
                                                                                      MD5:25CA3996DDB8F1964D3008660338BA72
                                                                                      SHA1:B66D73B5B38C2CCCA78232ADC3572BBBEB79365D
                                                                                      SHA-256:A2ABBD9BCFCE1DB1D78C99F4993AC0D414A08DB4AC5CE915B81119E17C4DA76F
                                                                                      SHA-512:A25AFE4FD981F458FE194A5D87C35BE5FC7D4426C1EEE8311AE655BB53364CD4AAC0710C0D7E6A91C0F248E2A6916902F4FD43A220CFF7A6474B77D93CF35C81
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Antigua) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1722
                                                                                      Entropy (8bit):3.6435096006301833
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5s4h19U2dBUGrmO7XGtN3kh0VKnNIVkHZU7WWhKRWRN:Cm19U2zUGrpzGtVE0VKnyVkHZWWWhKRG
                                                                                      MD5:6349567E3ED0FD11DD97056D2CFF11EE
                                                                                      SHA1:404F1B311D7072A6372351366BA15BB94F3AC7D2
                                                                                      SHA-256:41C816E9C0217A01D9288014013CD1D315B2CEB719F8BB310670D02B664A4462
                                                                                      SHA-512:782910DFA0FF8FEDB94D622271FA0FF983BC50A4FEE95FFC8EC3E89FB123B82C26701D81A994A8248F1C1CA0B1EF49C2752C4D7B498A0A623D79E2B6753DA432
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Araguaina) {. {-9223372036854775808 -11568 0 LMT}. {-1767214032 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1981
                                                                                      Entropy (8bit):3.6790048972731686
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5Wcap0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWvXydhSTP:vC0ZB9yRwhS+/po/lKENURMo8XvCWvX1
                                                                                      MD5:93B8CF61EDC7378C39BE33A77A4222FC
                                                                                      SHA1:8A01D2B22F8FC163B0FDCED4305C3FA08336AF7D
                                                                                      SHA-256:35E05545A12E213DCBC0C2F7FDCA5C79CD522E7D2684EDF959E8A0A991BEF3C8
                                                                                      SHA-512:68333AB0C9348AF0994DB26FB6D34FF67ABF56AF1FBABB77F2C9EFF20E9A2DB2B59C5B81DF0C42299DE459B03DF13E07071B84576E62597920D1848F1E1FC9E3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Buenos_Aires) {. {-9223372036854775808 -14028 0 LMT}. {-2372097972 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-73378
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2009
                                                                                      Entropy (8bit):3.6543367491742913
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5f4p0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWg7ydhSTK+:No0ZB9yRwhS+/po/lKENURMo8XvCWg7r
                                                                                      MD5:7FCA355F863158D180B3179782A6E8C8
                                                                                      SHA1:CDFBC98923F7315388009F22F9C37626B677321F
                                                                                      SHA-256:C3FE34E5BE68503D78D63A2AFB5C970584D0854C63648D7FE6E2412A4E5B008F
                                                                                      SHA-512:6C2F9598C714BEBA7A538AAB7FA68C1962001C426C80B21F2A9560C72BCEA87B956821E68AF30B4576C1ECDB07E33D616934BD49943DA2E45841B10D483833C5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Catamarca) {. {-9223372036854775808 -15788 0 LMT}. {-2372096212 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-73378080
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):237
                                                                                      Entropy (8bit):4.672788403288451
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7/MMXAIVAIgp/MMXs290/MquQ90/MMXAv:MBaIMY/Mhp/MP290/MquQ90/MH
                                                                                      MD5:42D568B6100D68F9E5698F301F4EC136
                                                                                      SHA1:E0A5F43A80EB0FAAFBD45127DCAF793406A4CF3A
                                                                                      SHA-256:D442E5BBB801C004A7903F6C217149FCDA521088705AC9FECB0BC3B3058981BF
                                                                                      SHA-512:99580239B40247AF75FFAA44E930CDECB71F6769E3597AC85F19A8816F7D0859F6A0D5499AFAC2FA35C32BA05B75B27C77F36DE290DD0D442C0769D6F41E96DA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Catamarca)]} {. LoadTimeZoneFile America/Argentina/Catamarca.}.set TZData(:America/Argentina/ComodRivadavia) $TZData(:America/Argentina/Catamarca).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1976
                                                                                      Entropy (8bit):3.659938468164974
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5zxpp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWg7ydhSTP:1xT0ZB9yRwhS+/po/lKENURMo8XvCWgJ
                                                                                      MD5:C6A4EED52A2829671089F9E84D986BFB
                                                                                      SHA1:F5BBDD0C3347C7519282249AA48543C01DA95B7A
                                                                                      SHA-256:50541A1FBACAD2C93F08CD402A609C4984AF66E27DB9FAA7F64FDA93DDC57939
                                                                                      SHA-512:52EA5BB27C91C753275EAC90E082EEBE98B5997B830D8DD579174558355E3FED0AAF4AA02679B0866591951F04F358AFB113423872D57820143E75FEB4415B60
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Cordoba) {. {-9223372036854775808 -15408 0 LMT}. {-2372096592 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1974
                                                                                      Entropy (8bit):3.659895575974408
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5rCp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCfSWnzydhSR:FK0ZB9yRwhS+/po/lKENURMo8XvCfbzD
                                                                                      MD5:A7F2318729F0B4B04C9176CB5257691E
                                                                                      SHA1:0EAD91CBDC640DB67F64A34209359674AC47062A
                                                                                      SHA-256:E33962F99E6022ED1825898990B38C10F505DE6EC44DAFB00C75E3A7C1A61C8A
                                                                                      SHA-512:CB80580383309CCA4837556ED0444F2B931E1B3B13582023BFB715393C94C4F1279D8EC18CACB06BB13E3D32A535495DF2D093E225DF7B6DFFD3571A3B3573B2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Jujuy) {. {-9223372036854775808 -15672 0 LMT}. {-2372096328 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800 -1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2037
                                                                                      Entropy (8bit):3.655968476161033
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5J6p0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWXXydhSTK+:Hi0ZB9yRwhS+/po/lKENURMo8XvCWXXr
                                                                                      MD5:49BB6DAD5560E7C6EAEA6F3CF9EB1F67
                                                                                      SHA1:56E0D9DD4E6B12522A75F0ABFEBB6AE019614CB5
                                                                                      SHA-256:13CBECD826DD5DE4D8576285FC6C4DE39F2E9CF03F4A61F75316776CAED9F878
                                                                                      SHA-512:CA7EF1A94A6635EAB644C5EAAC2B890E7401745CFA97609BDA410D031B990C87EB2F97160731A45B5A8ADE48D883EAB529AE2379406852129102F0FDF92247D8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/La_Rioja) {. {-9223372036854775808 -16044 0 LMT}. {-2372095956 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2009
                                                                                      Entropy (8bit):3.649537276151328
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5Yep0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCpSGSldhSTS:C+0ZB9yRwhS+/po/lKENURMo8XvCpVap
                                                                                      MD5:69F8A1AC33BE03C008EC5FEBD1CE4CAA
                                                                                      SHA1:858362EFEA0C68C1EC9295A9FCE647B41DBF429D
                                                                                      SHA-256:B02DDE8DCF8E68B2B1DBF66ADF5B247E9833FEC347DFBC487C391FADA5706AD3
                                                                                      SHA-512:8373EAEEBF5EA028CC0673B10E9DFE84F4DFC2F9E9E8320D59E6CE6125643B31F5E61FC894E420A8D7E9C2FF242617DF911ABF0884AF5B32316A098C8524772D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Mendoza) {. {-9223372036854775808 -16516 0 LMT}. {-2372095484 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2012
                                                                                      Entropy (8bit):3.6703415662732746
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5mpp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWvXydhSTK+:oT0ZB9yRwhS+/po/lKENURMo8XvCWvXr
                                                                                      MD5:AC8E561F7573280594BDD898324E9442
                                                                                      SHA1:7DC6248ED29719700189FF3A69D06AAC7B54EB6B
                                                                                      SHA-256:0833962C0DE220BC601D764EE14442E98F83CB581816B74E5867540348227250
                                                                                      SHA-512:2FDD23ABA891EBEF01944F3C8F1A9E6844C182B0EB2CBEC0F942F268BAE51F0D7775370E262B500FE7151210F8849DD54BA5CEB2160AE03A5747A48A10933F05
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Rio_Gallegos) {. {-9223372036854775808 -16612 0 LMT}. {-2372095388 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-73378
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1945
                                                                                      Entropy (8bit):3.653135248071002
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5Vgp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWg7ydhSTQO:7w0ZB9yRwhS+/po/lKENURMo8XvCWg7D
                                                                                      MD5:70FB90E24FEEF5211C9488C938295F02
                                                                                      SHA1:5C903A669B51A1635284AD80877E0C6789D8EB26
                                                                                      SHA-256:FBDACFA5D82DC23ECDD9D9F8A4EF71F7DBB579BF4A621C545062A7AE0296141D
                                                                                      SHA-512:4C36B34B2203F6D4C78CC6F0E061BF35C4B98121D50096C8015EBA6DBEFA989DD2F2E32436EEE3055F1CF466BC3D4FD787A89873EEE4914CB51B273E335C90C3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Salta) {. {-9223372036854775808 -15700 0 LMT}. {-2372096300 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800 -1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2037
                                                                                      Entropy (8bit):3.6597750686514887
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5jXup0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWXXydhSTH:1+0ZB9yRwhS+/po/lKENURMo8XvCWXXh
                                                                                      MD5:BBB4D4B341E7FEC2E5A937267AADCD0F
                                                                                      SHA1:9AB509F97DCBAAE5ACA7F67853E86429438ED8DC
                                                                                      SHA-256:BAC6CC41865DD3D4F042FE6106176279F3DEB9127BE0146AF75AE1E47098AF43
                                                                                      SHA-512:49E32BD5BDBA773D99C883080660B431E8D4C806164C0354C848CF3AB0042797DBE7F6226BA234634A1DF254B0464ED5F714B054454520263536B0A77D7053D9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/San_Juan) {. {-9223372036854775808 -16444 0 LMT}. {-2372095556 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2013
                                                                                      Entropy (8bit):3.6516068215670687
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:58kp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCp1ESWn0SK4:K80ZB9yRwhS+/po/lKENURMo8XvCpmTr
                                                                                      MD5:767F99822C382327A318EAC0779321F3
                                                                                      SHA1:1352B21F20C7F742D57CB734013143C9B58DA221
                                                                                      SHA-256:B4590DF5AC1993E10F508CC5183809775F5248B565400BA05AE5F87B69D4E26B
                                                                                      SHA-512:C8FF21DC573DE5CB327DDA536391071012A038B8266C4E39922EC0F0EC975000E5D7AFBBE81D1C28DB8733E8B01E1E4D6BE0968D9EFCFC50DB102CC09BDABEA6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/San_Luis) {. {-9223372036854775808 -15924 0 LMT}. {-2372096076 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2036
                                                                                      Entropy (8bit):3.653313944168433
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5yM9Ep0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWg7ydhSU:b9c0ZB9yRwhS+/po/lKENURMo8XvCWgi
                                                                                      MD5:892E23EEB82C4EF52CB830C607E3DD6D
                                                                                      SHA1:9A9334DC1F9FBA0152C1B5CAA954F2FF1775B78C
                                                                                      SHA-256:F3D19E51463B4D04BE1CD4F36CD9DD5E3954B6186ADD6A176B78C3C4F399CCA1
                                                                                      SHA-512:4FCC3F61E261D57788756921AE21E54D387AB533ACF56182579B9082EC0791CD655D50BEDDAF996233CDBDE549F743855C191BCB581EF3D7877C4CE26B14EEC2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Tucuman) {. {-9223372036854775808 -15652 0 LMT}. {-2372096348 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2007
                                                                                      Entropy (8bit):3.6562927023582197
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:56Yp0SaS2SeSNS2S/SwS8gSvJ1/SKSHSRCSiS9SDS+SGwRShoSdXvCWvXydhSTHd:QI0ZB9yRwhS+/po/lKENURMo8XvCWvXz
                                                                                      MD5:EA31C60D08FFE56504DEC62A539F51D9
                                                                                      SHA1:79F31368AC9C141B5F0F5804A0D903C12B75A386
                                                                                      SHA-256:4E3A4539FE0D8E0401C8304E5A79F40C420333C92BF1227BCBB5DB242444ECD6
                                                                                      SHA-512:EB58A3122DE8FC7887622D3716E1D9D615625FC47C30BA0BD8112894B595263F04B37D43E142C43251C48D2CD703BB6F56966B965C5475DA83F2C290B6F564E8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Argentina/Ushuaia) {. {-9223372036854775808 -16392 0 LMT}. {-2372095608 -15408 0 CMT}. {-1567453392 -14400 0 -04}. {-1233432000 -10800 0 -04}. {-1222981200 -14400 0 -04}. {-1205956800 -10800 1 -04}. {-1194037200 -14400 0 -04}. {-1172865600 -10800 1 -04}. {-1162501200 -14400 0 -04}. {-1141329600 -10800 1 -04}. {-1130965200 -14400 0 -04}. {-1109793600 -10800 1 -04}. {-1099429200 -14400 0 -04}. {-1078257600 -10800 1 -04}. {-1067806800 -14400 0 -04}. {-1046635200 -10800 1 -04}. {-1036270800 -14400 0 -04}. {-1015099200 -10800 1 -04}. {-1004734800 -14400 0 -04}. {-983563200 -10800 1 -04}. {-973198800 -14400 0 -04}. {-952027200 -10800 1 -04}. {-941576400 -14400 0 -04}. {-931032000 -10800 1 -04}. {-900882000 -14400 0 -04}. {-890337600 -10800 1 -04}. {-833749200 -14400 0 -04}. {-827265600 -10800 1 -04}. {-752274000 -14400 0 -04}. {-733780800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):182
                                                                                      Entropy (8bit):4.760006229014668
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx09CvjHVAIg209CvjvQ2IAcGE/nVIAcGE9Cvju:SlSWB9IZaM3y79CzVAIgp9CE290/V90J
                                                                                      MD5:84605CB5AC93D51FF8C0C3D46B6A566F
                                                                                      SHA1:8B56DBDAD33684743E5828EFBD638F082E9AA20D
                                                                                      SHA-256:680651D932753C9F9E856018B7C1B6D944536111900CB56685ABA958DE9EC9C1
                                                                                      SHA-512:A5FA747C4743130308A8D8832AD33CF10B2DA2F214DEE129CAC9543D6F88FF232B4387026976578D037DF7816D0F4177835866A35F497438DD2526FEBACA2AF6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Curacao)]} {. LoadTimeZoneFile America/Curacao.}.set TZData(:America/Aruba) $TZData(:America/Curacao).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7685
                                                                                      Entropy (8bit):3.4198614734785875
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:57TOr5dwtvNJZWDQ2eBTVSZKnb0Yg6f5xgTK5IQPyP8D3rVPe9DptTkhXXkbCkCg:5P7J1A
                                                                                      MD5:625A707182C6E0027D49F0FFD775AC51
                                                                                      SHA1:6423A50DB875051656A1C3C5B6C6AF556F8FBE0A
                                                                                      SHA-256:CD884C5C99949F5723DC94FBFF011B97AE0989EF2EDE089B30C2CD4893AFCE08
                                                                                      SHA-512:C5787953997D7D1B583AEE7F68FCC255AC1FAC5C9A7025C8093F274206A0C8163DE221B4823F7750B5B30AF32D673F88D5956C0E510851EBA72CC2360AC35D18
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Asuncion) {. {-9223372036854775808 -13840 0 LMT}. {-2524507760 -13840 0 AMT}. {-1206389360 -14400 0 -04}. {86760000 -10800 0 -03}. {134017200 -14400 0 -04}. {162878400 -14400 0 -04}. {181368000 -10800 1 -04}. {194497200 -14400 0 -04}. {212990400 -10800 1 -04}. {226033200 -14400 0 -04}. {244526400 -10800 1 -04}. {257569200 -14400 0 -04}. {276062400 -10800 1 -04}. {291783600 -14400 0 -04}. {307598400 -10800 1 -04}. {323406000 -14400 0 -04}. {339220800 -10800 1 -04}. {354942000 -14400 0 -04}. {370756800 -10800 1 -04}. {386478000 -14400 0 -04}. {402292800 -10800 1 -04}. {418014000 -14400 0 -04}. {433828800 -10800 1 -04}. {449636400 -14400 0 -04}. {465451200 -10800 1 -04}. {481172400 -14400 0 -04}. {496987200 -10800 1 -04}. {512708400 -14400 0 -04}. {528523200 -10800 1 -04}. {544244400 -14400 0 -04}. {560059200 -10800 1 -04}. {57586
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):332
                                                                                      Entropy (8bit):4.582750266902939
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5290/qlfbm2OHvcFGxYP329V/uFn/TUs/uFn/lHIs8/kRm5/uFb/C/iin:MBp5290/emdHLYP323/uFn/9/uFn/dBs
                                                                                      MD5:66777BB05E04E030FABBC70649290851
                                                                                      SHA1:97118A1C4561FC1CC9B7D18EE2C7D805778970B8
                                                                                      SHA-256:2C6BBDE21C77163CD32465D773F6EBBA3332CA1EAEEF88BB95F1C98CBCA1562D
                                                                                      SHA-512:B00F01A72A5306C71C30B1F0742E14E23202E03924887B2418CA6F5513AE59E12BC45F62B614716BBE50A7BEA8D62310E1B67BB39B84F7B1B40C5D2D19086B7C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Atikokan) {. {-9223372036854775808 -21988 0 LMT}. {-2366733212 -21600 0 CST}. {-1632067200 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-923248800 -18000 1 CDT}. {-880214400 -18000 0 CWT}. {-769395600 -18000 1 CPT}. {-765388800 -18000 0 EST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):172
                                                                                      Entropy (8bit):4.761501750421919
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0/yO5pVAIg20/yOvYvt2IAcGE/ol7x+IAcGE/yOun:SlSWB9IZaM3y7/ykVAIgp/y9F290/ola
                                                                                      MD5:E641C6615E1EF015427202803761AADD
                                                                                      SHA1:E254129517335E60D82DFE00C6D5AF722D36565A
                                                                                      SHA-256:9C546927B107BB4AB345F618A91C0F8C03D8A366028B2F0FCBF0A3CE29E6588E
                                                                                      SHA-512:B7D34B1EA0D6722D7BFCD91F082D79EE009B97A2B5684D76A3F04CB59079637134275CF9A0306B9F4423A03CC0C2AB43994207D1B209161C893C2C6F3F3B6311
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Adak)]} {. LoadTimeZoneFile America/Adak.}.set TZData(:America/Atka) $TZData(:America/Adak).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1944
                                                                                      Entropy (8bit):3.6123892296166242
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:534h19U2dBUGrmO7XGtN3kh0OjmimtnNIVkHZU7WWhw5N:Nm19U2zUGrpzGtVE0OjmicnyVkHZWWWK
                                                                                      MD5:E52095DB1E77EC4553A0AF56665CDE51
                                                                                      SHA1:CED0966E8D89443F2CCBBE9F44DA683F7D2D688B
                                                                                      SHA-256:30A4658BD46F88A1585ACABB9EB6BA03DB929EAF7D2F430BC4864D194A6CC0DD
                                                                                      SHA-512:D6F3D51393F9D8F6414023A8435213EC6BD4FCAA5084B664B828CCDE8D57821E3E284B3D5A27414B4C2AB0B71E31D775D1F924C926C849F591D361DAA8681D8A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Bahia) {. {-9223372036854775808 -9244 0 LMT}. {-1767216356 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}. {602
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6625
                                                                                      Entropy (8bit):3.791871111929614
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:NqZL/1dCYDXEaXTuXMEXiH4RxGIJkYWXsWwav7jNf4sOVEmbwBlhcCLfYkNRfsNz:NqZL/1dCYDDCxyH4RxGIJkYWXsWwav7S
                                                                                      MD5:6A18936EC3AA0FCEC8A230ADAF90FF1E
                                                                                      SHA1:B13B8BF1FD2EEED44F63A0DC71F0BCE8AC15C783
                                                                                      SHA-256:974481F867DEA51B6D8C6C21432F9F6F7D6A951EC1C34B49D5445305A6FB29B7
                                                                                      SHA-512:75AA7A3AE63ED41AFF6CF0F6DC3CA649786A86A64293E715962B003383D31A8AD2B99C72CE6B788EC4DFF1AF7820F011B3F1FD353B37C326EF02289CE4A061BF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Bahia_Banderas) {. {-9223372036854775808 -25260 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {-873828000 -25200 0 MST}. {-661539600 -28800 0 PST}. {28800 -25200 0 MST}. {828867600 -21600 1 MDT}. {846403200 -25200 0 MST}. {860317200 -21600 1 MDT}. {877852800 -25200 0 MST}. {891766800 -21600 1 MDT}. {909302400 -25200 0 MST}. {923216400 -21600 1 MDT}. {941356800 -25200 0 MST}. {954666000 -21600 1 MDT}. {972806400 -25200 0 MST}. {989139600 -21600 1 MDT}. {1001836800 -25200 0 MST}. {1018170000 -21600 1 MDT}. {1035705600 -25200 0 MST}. {1049619600 -21600 1 MDT}. {1067155200 -25200 0 MST}. {1081069200 -21600 1 MDT}. {1099209600 -25200 0 MST}. {1112518800 -21600 1 MDT}. {1130659200 -25200 0 MST}. {1143968400 -
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):413
                                                                                      Entropy (8bit):4.429320498710922
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp5290eNJmdH9Gcvm/uFkCFP/K/uFkCFks/v/h/uFkCFFoI/qZ/uFkCF3dX/r:cQT7enmSkC9/KSkCT/BSkCLl/wSkCj/r
                                                                                      MD5:49EED111AB16F289E7D2D145A2641720
                                                                                      SHA1:2F0A37524209FC26421C2951F169B4352250ED9E
                                                                                      SHA-256:E7415944397EF395DDBD8EACB6D68662908A25E2DB18E4A3411016CBB6B8AFC6
                                                                                      SHA-512:3AD4511798BA763C4E4A549340C807FE2FDF6B107C74A977E425734BBADDFF44ADAA68B5AE1F96170902A10208BC4BBF551C596EB1A3E292071549B8F3012A35
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Barbados) {. {-9223372036854775808 -14309 0 LMT}. {-1451678491 -14309 0 BMT}. {-1199217691 -14400 0 AST}. {234943200 -10800 1 ADT}. {244616400 -14400 0 AST}. {261554400 -10800 1 ADT}. {276066000 -14400 0 AST}. {293004000 -10800 1 ADT}. {307515600 -14400 0 AST}. {325058400 -10800 1 ADT}. {338706000 -14400 0 AST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):996
                                                                                      Entropy (8bit):3.799419505060255
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQYe3wc4h1u80V2dBUGphmC17ewGtN3kN:5VB4h19U2dBUGrmO7XGtN3kN
                                                                                      MD5:2F3314B71810C1AC0280F292F09F37BE
                                                                                      SHA1:B8702125A9768AE530354CE2A765BC07BABAEF34
                                                                                      SHA-256:9ECA949D328915C6CB02A2E6084F3E0730D49F1C53C6D6AA12751F852C51BF02
                                                                                      SHA-512:C4E1ADD2E580BFD4100EE776305530BCEA017D57A65205881536A1CDDA3A299816C133B5B1F4B40A99E47BB94AE2A7E727F3D24D06131705818CC0C1AA12E5BD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Belem) {. {-9223372036854775808 -11636 0 LMT}. {-1767213964 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {590032800 -10800 0 -03}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1854
                                                                                      Entropy (8bit):3.8463726575443573
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQMeVyJOCSSVTSuWcLwX1QIXVlXco0bKdTu/pUHQGyUrROSTgltVJyODrUSn/mJO:5hxKj4jDMtVpIM/mjM/sQ
                                                                                      MD5:1BFD01ECF77E031C23BDA5ED371E061F
                                                                                      SHA1:7A38C5665A834B812613E4D10FE4D1E45F606407
                                                                                      SHA-256:BDF09D97876E3A3C0422C655562252806B4EF914679FDCAB6DD78BD2B84DD932
                                                                                      SHA-512:D7A2C2645129C4BAB1F0170A29A084396AD8CF07237DE339512C3A5C7227B017BF1D4B78EBD5A7274CAF1D172ECB2DB6F912887BFF1C6AC73E9D645E333A75A3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Belize) {. {-9223372036854775808 -21168 0 LMT}. {-1822500432 -21600 0 CST}. {-1616954400 -19800 1 -0530}. {-1606069800 -21600 0 CST}. {-1585504800 -19800 1 -0530}. {-1574015400 -21600 0 CST}. {-1554055200 -19800 1 -0530}. {-1542565800 -21600 0 CST}. {-1522605600 -19800 1 -0530}. {-1511116200 -21600 0 CST}. {-1490551200 -19800 1 -0530}. {-1479666600 -21600 0 CST}. {-1459101600 -19800 1 -0530}. {-1448217000 -21600 0 CST}. {-1427652000 -19800 1 -0530}. {-1416162600 -21600 0 CST}. {-1396202400 -19800 1 -0530}. {-1384713000 -21600 0 CST}. {-1364752800 -19800 1 -0530}. {-1353263400 -21600 0 CST}. {-1333303200 -19800 1 -0530}. {-1321813800 -21600 0 CST}. {-1301248800 -19800 1 -0530}. {-1290364200 -21600 0 CST}. {-1269799200 -19800 1 -0530}. {-1258914600 -21600 0 CST}. {-1238349600 -19800 1 -0530}. {-1226860200 -21600 0 CST}. {-1206900000 -1980
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):331
                                                                                      Entropy (8bit):4.599775510303771
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5290Am2OHff4YPawmX/bVVFUFkCFVUP/GH6/XVVFUFkIZVVFUFkeF3k/g:MBp5290AmdHff4YPawY/b/uFkCFVUP/L
                                                                                      MD5:5ACBD50E1CB87B4E7B735A8B5281917B
                                                                                      SHA1:3E92C60B365C7E1F9BF5F312B007CBFD4175DB8F
                                                                                      SHA-256:E61F3762B827971147772A01D51763A18CC5BED8F736000C64B4BDFF32973803
                                                                                      SHA-512:9284FFDF115C7D7E548A06A6513E3591F88EE3E5197106B71B54CD82F27890D12773381218BCA69720F074A6762282F25830422DFA402FF19301D6834FD9FF7D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Blanc-Sablon) {. {-9223372036854775808 -13708 0 LMT}. {-2713896692 -14400 0 AST}. {-1632074400 -10800 1 ADT}. {-1615143600 -14400 0 AST}. {-880221600 -10800 1 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {14400 -14400 0 AST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1159
                                                                                      Entropy (8bit):3.7116873200926586
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQETmex8Sos/USws/QSI/LHSD/vOSy/WS3o/aS2/vSh/TSSX/WcSp/ySZd/YlSjx:5EqSaSwXS4SqSbS3JSySxSxcSESAlSQE
                                                                                      MD5:0858FCA5A59C9C6EE38B7E8A61307412
                                                                                      SHA1:685597A5FD8BFEBF3EC558DB8ABF11903F63E05E
                                                                                      SHA-256:825E89E4B35C9BA92CF53380475960C36307BF11FD87057891DF6EEBA984A88D
                                                                                      SHA-512:7369EE42CD73CFD635505BF784E16A36C9BBDE0BDAAAB405CB8401EBC508F4CE0B0155206756C1905E915756F1D3CDC381C6B9C357A01EAE0ECC4C448978844A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Boa_Vista) {. {-9223372036854775808 -14560 0 LMT}. {-1767211040 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {590036400 -1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):237
                                                                                      Entropy (8bit):4.649012348678967
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5290bJqm2OHDgPcuknTEXPKV93kR/uFeEV/KV9C:MBp5290bUmdHDgPcukT8O93Y/uF7/O9C
                                                                                      MD5:4B3B0F66FB3BC69A5AB5DA79D02F7E34
                                                                                      SHA1:79B84C0578BBB0E4C07E99977D02EDE45F11CC8A
                                                                                      SHA-256:E7C45CA67F1BA913E7DC1632C166973FDA8DA4734F8BCF3AB1157A45454C8D7B
                                                                                      SHA-512:96289B4D179F146D6C5FB5DDAA4336CBCB60CF27BABCC20B9691387920897B293903DF41F5D9DE7237A689013A9266134B32AB4B4656796419B46E8378D84358
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Bogota) {. {-9223372036854775808 -17776 0 LMT}. {-2707671824 -17776 0 BMT}. {-1739041424 -18000 0 -05}. {704869200 -14400 1 -05}. {733896000 -18000 0 -05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8324
                                                                                      Entropy (8bit):3.772029913040983
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:e45eG5cnWsGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:xGnWdVUC2mWBNwWTxyWR
                                                                                      MD5:239425659E7345C757E6A44ABF258A22
                                                                                      SHA1:9659217B4D55795333DFA5E08451B69D17F514AD
                                                                                      SHA-256:6D6D377DDF237B1C5AB012DDDEB5F4FAA39D1D51240AA5C4C34EE96556D2D2F4
                                                                                      SHA-512:3891D7BC1F84FF6B01B6C2DF6F0413C9E168E5B84CE445030F1B871766DD38B2FF7418501AB7C0DCEAB8381E538D65DF4E7708502EE924546A28DF1AC9BB7129
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Boise) {. {-9223372036854775808 -27889 0 LMT}. {-2717640000 -28800 0 PST}. {-1633269600 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-1601820000 -25200 1 PDT}. {-1583679600 -28800 0 PST}. {-1471788000 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126255600 -25200 0 MST}. {129114000 -21600 0 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {2307
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):234
                                                                                      Entropy (8bit):4.775296176809929
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7/MQA+zJFVAIgp/MQA+z2L290BFzk5h490/MQA+zq:MBaIMY/MV+z6p/MV+z2L290rzy490/Mz
                                                                                      MD5:861DAA3C2FFF1D3E9F81FB5C63EA71F1
                                                                                      SHA1:8E219E63E6D7E702FD0644543E05778CE786601A
                                                                                      SHA-256:1D32F22CF50C7586CB566E45988CA05538E61A05DF09FD8F824D870717832307
                                                                                      SHA-512:71B47C369DF1958C560E71B114616B999FB4B091FAA6DD203B29D2555FFE419D6FC5EF82FA810DC56E6F00722E13B03BFBED2516B4C5C2321F21E03F0198B91B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Buenos_Aires)]} {. LoadTimeZoneFile America/Argentina/Buenos_Aires.}.set TZData(:America/Buenos_Aires) $TZData(:America/Argentina/Buenos_Aires).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7487
                                                                                      Entropy (8bit):3.787618233072156
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:OGoGm+4ILQzXN+C2mWBNQMsmNTxf6AeO+cblX:P7YUC2mWBNwWTxyWR
                                                                                      MD5:839C797E403B4C102D466B1E759A6CC4
                                                                                      SHA1:D95864FF269AD16B35CDAAC95AE03D8306B8DE1F
                                                                                      SHA-256:37E219C4C7AEBCC8919293114280A247E8072F2760E69F083E9FDD6BE460B9BC
                                                                                      SHA-512:A74F3B3C83815F62F6BDF4199EA471872AE539D6C0C595BA41E6D2DF033075D74CC00995C8F99C3ADD4B1E5E04A12D663BE9BED4CE600FC5F067D7CDDED4D7F5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Cambridge_Bay) {. {-9223372036854775808 0 0 -00}. {-1577923200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-147891600 -18000 1 MDDT}. {-131562000 -25200 0 MST}. {325674000 -21600 1 MDT}. {341395200 -25200 0 MST}. {357123600 -21600 1 MDT}. {372844800 -25200 0 MST}. {388573200 -21600 1 MDT}. {404899200 -25200 0 MST}. {420022800 -21600 1 MDT}. {436348800 -25200 0 MST}. {452077200 -21600 1 MDT}. {467798400 -25200 0 MST}. {483526800 -21600 1 MDT}. {499248000 -25200 0 MST}. {514976400 -21600 1 MDT}. {530697600 -25200 0 MST}. {544611600 -21600 1 MDT}. {562147200 -25200 0 MST}. {576061200 -21600 1 MDT}. {594201600 -25200 0 MST}. {607510800 -21600 1 MDT}. {625651200 -25200 0 MST}. {638960400 -21600 1 MDT}. {657100800 -25200 0 MST}. {671014800 -21600 1 MDT}. {688550400 -25200 0 MST}. {
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7652
                                                                                      Entropy (8bit):3.4267759764212906
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:ylD7ZYOtu7D/fVLF5H1RuSFuY66DCM/rDAWicDqRp5RepgK3i8kmmkniko1Kg+R7:n4jF17vArp
                                                                                      MD5:87CB052D17717B696F3D9158B237E4FB
                                                                                      SHA1:79B3947A50ED15C908CFC2D699D2B7F11468E7B2
                                                                                      SHA-256:113E8ADCECE14A96261A59E0C26073EA5CFF864C4FF2DA6FAB5C61129A549043
                                                                                      SHA-512:2BF788FD51E7268A1989F1C564E7B81B002B876381AEC561564D4BCE8D76C9D3F621A2F1AB26C1EAB5E5C64A3C41A536A1E21A5322D678CB11CB608333515144
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Campo_Grande) {. {-9223372036854775808 -13108 0 LMT}. {-1767212492 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {592977600
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1365
                                                                                      Entropy (8bit):3.9551252054637245
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQseeRb/uyV3XVP/upG/u/yRXiSn/Q8Sn/mfSn/yISn/PSn/zI3Sn/RSn/lfSn/A:5i7XEaRyM/BM/mfM/1M/PM/zmM/RM/l/
                                                                                      MD5:2EC91D30699B64FA8199004F97C63645
                                                                                      SHA1:4C4E00857B1FB3970E7C16C4EFAA9347ED2C3629
                                                                                      SHA-256:4EB4C729FF11E170D683310422D8F10BCE78992CF13DACCB06662308C76CCA3B
                                                                                      SHA-512:D7811C32E4D2B3B9FAEE730D580BC813EC41B63765DE34BB3A30A0D9BBEF2F090E2DA59C6D9A4D8FC91885DDEA2B6E3B1FD3FD434E42D805AF66E578E66AE6FE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Cancun) {. {-9223372036854775808 -20824 0 LMT}. {-1514743200 -21600 0 CST}. {377935200 -18000 0 EST}. {828860400 -14400 1 EDT}. {846396000 -18000 0 EST}. {860310000 -14400 1 EDT}. {877845600 -18000 0 EST}. {891759600 -14400 1 EDT}. {902041200 -18000 0 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001833200 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000 -18000 1 CDT}. {1067151600 -21600 0 CST}. {1081065600 -18000 1 CDT}. {1099206000 -21600 0 CST}. {1112515200 -18000 1 CDT}. {1130655600 -21600 0 CST}. {1143964800 -18000 1 CDT}. {1162105200 -21600 0 CST}. {1175414400 -18000 1 CDT}. {1193554800 -21600 0 CST}. {1207468800 -18000 1 CDT}. {1225004400 -21600 0 CST}. {1238918400 -18000 1 CD
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):274
                                                                                      Entropy (8bit):4.527582804527589
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52909+ET2m2OHXP8Hk4lvFVFQVgIUF/R/OGWnVVFQVg2vR/O9:MBp5290QmdHXPy/ltvAYFZ/OGqVvA9/K
                                                                                      MD5:D47486658B408AAF7F91569435B49D19
                                                                                      SHA1:C69EDC17F2E77723A5C711342822BF21ECCB9C8E
                                                                                      SHA-256:555A66624909220ACCCB35D852079D44944E188A81DF6A07CBA7433AC2478E5E
                                                                                      SHA-512:35A4AF702405BD36F6EF7E42F1E1AEAD841A5710D04306C1C3390B3CC134E88F1221F284F489F6926C58E8FD50BD7E6BE0E5904AAE2ACBEA817EFCE0AAE61169
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Caracas) {. {-9223372036854775808 -16064 0 LMT}. {-2524505536 -16060 0 CMT}. {-1826739140 -16200 0 -0430}. {-157750200 -14400 0 -04}. {1197183600 -16200 0 -0430}. {1462086000 -14400 0 -04}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):222
                                                                                      Entropy (8bit):4.615632762186706
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7/MMXAIVAIgp/MMXs29094SXAFB5290/MMXAv:MBaIMY/Mhp/MP290mh5290/MH
                                                                                      MD5:359226FA8A7EAFCA0851F658B4EBBCDC
                                                                                      SHA1:611A24C24462DF5994B5D043E65770B778A6443B
                                                                                      SHA-256:F2782781F1FB7FD12FF85D36BB244887D1C2AD52746456B3C3FEAC2A63EC2157
                                                                                      SHA-512:6F9DD2D1662103EC5A34A8858BDFA69AC9F74D3337052AB47EA61DC4D76216886A0644CF1284940E8862A09CBA3E0A87784DFDB6414434C92E45004AAF312614
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Catamarca)]} {. LoadTimeZoneFile America/Argentina/Catamarca.}.set TZData(:America/Catamarca) $TZData(:America/Argentina/Catamarca).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):178
                                                                                      Entropy (8bit):4.781235086647991
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52IAcGE91pkXGm2OHEFvpoevUdR4FIUPvGDUwXvp3VVFVGHC:SlSWB9X52909zm2OHEdGeG4vOIw/ZVVF
                                                                                      MD5:1FFD7817EE1DC55EF72AD686749AE9CE
                                                                                      SHA1:AE972D5395F3562F052780AD014BA2C0767943B6
                                                                                      SHA-256:9CE77C0A01BFDA002EE3B2DCEF316DB7C9AC80B270DFC3A0D7769021E731D849
                                                                                      SHA-512:480D8D56F7B8829F6E82D8AFF1A0A161C3C45402D85A588027E98F2FA20C6E6F35549FFC5F38F0EEA9C4190A70B334066FCD406D39FF06EE7B7855AF75CD0FC3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Cayenne) {. {-9223372036854775808 -12560 0 LMT}. {-1846269040 -14400 0 -04}. {-71092800 -10800 0 -03}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):180
                                                                                      Entropy (8bit):4.723325073771884
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0u55DdVAIg20u5AF2IAcGE91mr4IAcGEu5un:SlSWB9IZaM3y7oDdVAIgpX2909Yr490/
                                                                                      MD5:E03755B574F4962030DB1E21D1317963
                                                                                      SHA1:5B5FA4787DA7AE358EFEA81787EB2AB48E4D7247
                                                                                      SHA-256:8E85F05135DB89CB304689081B22535002DBD184D5DCDBF6487CD0A2FBE4621E
                                                                                      SHA-512:8B85E51BD8DC04AE768A4D42F8DF0E0D60F23FAB2607E3DCAD4E10695E50C2A3F2124DA7E3A87E97DB7AF090EF70C9A5B5C2D34F7D1B6F74FEFEA9148FEB15AB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Panama)]} {. LoadTimeZoneFile America/Panama.}.set TZData(:America/Cayman) $TZData(:America/Panama).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):11003
                                                                                      Entropy (8bit):3.728817385585057
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:rXxbWziyUZB4ME9Hmp7EYQYMWUJ2eQzURWu3OabMQxXI6X8x3X3D2DgOMIOdXkqq:rXxbWziyUZB4ME9Hmp7EYQYMWUJ2eQzg
                                                                                      MD5:6175956F3052F3BE172F6110EF6342EE
                                                                                      SHA1:532E2600DFAFAACCD3A187A233956462383401A6
                                                                                      SHA-256:FC172494A4943F8D1C3FC35362D96F3D12D6D352984B93BC1DE7BDCB7C85F15E
                                                                                      SHA-512:36B47003183EB9D7886F9980538DB3BDDC231BB27D4F14006CDBE0CB9042215A02559D97085679F8320DED6109FC7745DC43859EBA99B87365B09C4526D28193
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Chicago) {. {-9223372036854775808 -21036 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-1577901600 -21600 0 CST}. {-1563724800 -18000 1 CDT}. {-1551632400 -21600 0 CST}. {-1538928000 -18000 1 CDT}. {-1520182800 -21600 0 CST}. {-1504454400 -18000 1 CDT}. {-1491757200 -21600 0 CST}. {-1473004800 -18000 1 CDT}. {-1459702800 -21600 0 CST}. {-1441555200 -18000 1 CDT}. {-1428253200 -21600 0 CST}. {-1410105600 -18000 1 CDT}. {-1396803600 -21600 0 CST}. {-1378656000 -18000 1 CDT}. {-1365354000 -21600 0 CST}. {-1347206400 -18000 1 CDT}. {-1333904400 -21600 0 CST}. {-1315152000 -18000 1 CDT}. {-1301850000 -21600 0 CST}. {-1283702400 -18000 1 CDT}. {-1270400400 -21600 0 CST}. {-1252252800 -18000 1 CDT}. {-1238950800 -21600 0 CST}. {-1220803200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6593
                                                                                      Entropy (8bit):3.795313170000037
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:LJNfzBT8tRkfKxhzY720zaOXmlITHjLc1cb:dN18tRkfKv+2wB9h
                                                                                      MD5:B0CA4CFF6571AFBFF25FAC72CDDB5B08
                                                                                      SHA1:1BF3ACEC369AEA504AAA248459A115E61CF79C4B
                                                                                      SHA-256:C689A3BEED80D26EAB96C95C85874428F80699F7E136A44377776E52B5855D00
                                                                                      SHA-512:398496EBA4344EDF78AFBF51BD6024481D3A12546D0EE597B7C593A1CD1BF575AFDE62FFADE7A0DDFEDA79CF235612E6F4DA74D7305A6E48F5942EA10D8A4F8E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Chihuahua) {. {-9223372036854775808 -25460 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {820476000 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {883634400 -21600 0 CST}. {891766800 -21600 0 MDT}. {909302400 -25200 0 MST}. {923216400 -21600 1 MDT}. {941356800 -25200 0 MST}. {954666000 -21600 1 MDT}. {972806400 -25200 0 MST}. {989139600 -21600 1 MDT}. {1001836800 -25200 0 MST}. {1018170000 -21600 1 MDT}. {1035705600 -25200 0 MST}. {1049619600 -21600 1 MDT}. {1067155200 -25200 0 MST}. {1081069200 -21600 1 MDT}. {1099209600 -25200 0 MST}. {1112518800 -21600 1 MDT}. {1130659200 -25200 0 MST}. {1143968400 -21600 1 MDT}. {1162108800 -25
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):193
                                                                                      Entropy (8bit):4.822360211437507
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7/qlfSwFVAIgp/qlfAvt2909qEac90/qlfu:MBaIMY/TwQp/tvt290Fac90/j
                                                                                      MD5:2541EC94D1EA371AB1361118EEC98CC6
                                                                                      SHA1:950E460C1BB680B591BA3ADA0CAA73EF07C229FE
                                                                                      SHA-256:50E6EE06C0218FF19D5679D539983CEB2349E5D25F67FD05E142921431DC63D6
                                                                                      SHA-512:2E6B66815565A9422015CAB8E972314055DC4141B5C21B302ABD671F30D0FBAE1A206F3474409826B65C30EDBEDD46E92A99251AB6316D59B09FC5A8095E7562
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Atikokan)]} {. LoadTimeZoneFile America/Atikokan.}.set TZData(:America/Coral_Harbour) $TZData(:America/Atikokan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):214
                                                                                      Entropy (8bit):4.74004515366486
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7/MdVAIgp/MOF29093+90/Msn:MBaIMY/M4p/MOF290c90/Ms
                                                                                      MD5:89870B2001C2EE737755A692E7CA2F18
                                                                                      SHA1:F67F6C22BF681C105068BEEB494A59B3809C5ED8
                                                                                      SHA-256:38C3DD7DAF75DBF0179DBFC387CE7E64678232497AF0DACF35DC76050E9424F7
                                                                                      SHA-512:EFA8A5A90BE6FAAA7C6F5F39CBBBA3C7D44C7943E1BB1B0F7E966FEE4F00F0E4BF1D999A377D4E5230271B120B059EB020BD93E7DA46CF1FFA54AB13D7EC3FFE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Cordoba)]} {. LoadTimeZoneFile America/Argentina/Cordoba.}.set TZData(:America/Cordoba) $TZData(:America/Argentina/Cordoba).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):416
                                                                                      Entropy (8bit):4.443696146912203
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp5290l0TmdHd5PZ6kibvI8/uFn/mSU/uFn/i/uFn/4Y8/uFn//DVn:cQmAed9Z6n5Sn/mtSn/iSn/4JSn/bh
                                                                                      MD5:D47A1FBA5AD701E1CA168A356D0DA0A9
                                                                                      SHA1:6738EA6B4F54CC76B9723917AA373034F6865AF1
                                                                                      SHA-256:51F08C1671F07D21D69E2B7868AA5B9BDBFA6C31D57EB84EB5FF37A06002C5CD
                                                                                      SHA-512:DB6AD81466500F22820941DF3369155BA03CFA42FA9D267984A28A6D15F88E1A71625E3DC578370B5F97727355EBB7C338482FA33A7701ADB85A160C09BAD232
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Costa_Rica) {. {-9223372036854775808 -20173 0 LMT}. {-2524501427 -20173 0 SJMT}. {-1545071027 -21600 0 CST}. {288770400 -18000 1 CDT}. {297234000 -21600 0 CST}. {320220000 -18000 1 CDT}. {328683600 -21600 0 CST}. {664264800 -18000 1 CDT}. {678344400 -21600 0 CST}. {695714400 -18000 1 CDT}. {700635600 -21600 0 CST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):211
                                                                                      Entropy (8bit):4.798554218839104
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52909ovTm2OHpcHvvPagcyEXC/vHcQCi:MBp52900mdHpcHPagPECvHl
                                                                                      MD5:9E3726148A53940507998FA1A5EEE6DB
                                                                                      SHA1:2493B72DF895ED2AE91D09D43BDDADDB41E4DEBC
                                                                                      SHA-256:E809F227E92542C6FB4BAC82E6079661EEF7700964079AA4D7E289B5B400EC49
                                                                                      SHA-512:F5ED4085160A06DE672DB93CEE700C420D0438DE9AC3548B291DA236AA8CCC84F97270DA3956E49432AE1E281CCECEB6DF92E71EB305106655B4DF231E04B558
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Creston) {. {-9223372036854775808 -27964 0 LMT}. {-2713882436 -25200 0 MST}. {-1680454800 -28800 0 PST}. {-1627833600 -25200 0 MST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7646
                                                                                      Entropy (8bit):3.4194836403778353
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:+lD7ZYOtu7D/fVLF5H1RuSFuY66DCVDAWicDqRp5RepgK3i8kmmkniko1Kg+R4hu:3jF17vArp
                                                                                      MD5:7309EBE8210C3C84C24D459289484EFA
                                                                                      SHA1:31EFE19E3CA2DB512C7AC9CAFD72991EF0517FD3
                                                                                      SHA-256:FE7543FF576D7EDC3A3FF82759E5C244DE8EB57A95744E20610CEDF6E29AB4C9
                                                                                      SHA-512:41C94E4093F015B61ACEFCEA067C101AA1ECB855789CFDB8FA4D17589D20868FB7A1456D21C90B5261445D970E5E7F134CBAF17EA926278C9E6DFC471D29F896
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Cuiaba) {. {-9223372036854775808 -13460 0 LMT}. {-1767212140 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {592977600 -1080
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.858195118945703
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52IAcGE9CvjEwcXGm2OHCevUd5xF9vFVFIVgYd/iQG3VFpRR/r:SlSWB9X52909C4wTm2OHjyxzFQVgIUFp
                                                                                      MD5:CE0F18F27502E771B27236C5BF7D3317
                                                                                      SHA1:D2E68415B8544A8BAC2A4F335854FC048BD4B34C
                                                                                      SHA-256:118EC9D89937FDA05FCE45F694F8C3841664BBE9DFADB86347B375BF437F9BD6
                                                                                      SHA-512:B04B5DAB30384FF05ABFC235DA4F9BFE96F400076DEB7CBBA0938F93E66BFF5E86B18E95E9BC0448D812722C8F2D4AFD78AC75180FD80D992F96DFA0CEC156AC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Curacao) {. {-9223372036854775808 -16547 0 LMT}. {-1826738653 -16200 0 -0430}. {-157750200 -14400 0 AST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1089
                                                                                      Entropy (8bit):3.793747183330894
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQZefXQgiu2kPIw1Dtc7UXxH9vC0gdtiyW8RWK79ET7cSXKIuXvY:52XQgiu2kgw1DtuyxdvC0gdtiyW8RB7S
                                                                                      MD5:E83072C1351121C5CFD74E110ECA9B4B
                                                                                      SHA1:360B468851EBFF266E4A8F40FE5D196BC6809E65
                                                                                      SHA-256:6A12AD52CBCF0B3F8BB449C7BC51A784BE560F4BD13545D04426E76B2511D8F9
                                                                                      SHA-512:539C53AA1D02E3AABF65873CA830782697AC9D55EC6694B68B95C325608F8703882B1182215D2B4E2B6066784AC880BCF0F4EBC5A72B2E637BD9B2C3A61D2979
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Danmarkshavn) {. {-9223372036854775808 -4480 0 LMT}. {-1686091520 -10800 0 -03}. {323845200 -7200 0 -02}. {338950800 -10800 0 -03}. {354675600 -7200 1 -02}. {370400400 -10800 0 -03}. {386125200 -7200 1 -02}. {401850000 -10800 0 -03}. {417574800 -7200 1 -02}. {433299600 -10800 0 -03}. {449024400 -7200 1 -02}. {465354000 -10800 0 -03}. {481078800 -7200 1 -02}. {496803600 -10800 0 -03}. {512528400 -7200 1 -02}. {528253200 -10800 0 -03}. {543978000 -7200 1 -02}. {559702800 -10800 0 -03}. {575427600 -7200 1 -02}. {591152400 -10800 0 -03}. {606877200 -7200 1 -02}. {622602000 -10800 0 -03}. {638326800 -7200 1 -02}. {654656400 -10800 0 -03}. {670381200 -7200 1 -02}. {686106000 -10800 0 -03}. {701830800 -7200 1 -02}. {717555600 -10800 0 -03}. {733280400 -7200 1 -02}. {749005200 -10800 0 -03}. {764730000 -7200 1 -02}. {780454800 -10800 0
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7609
                                                                                      Entropy (8bit):3.785302701923574
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:nxr+C2ZCHtffWsBNwj/lpmlOxGcKcnRH31t+ucgge:nx/Nf+aNwj/lpmlOxnKcndIG
                                                                                      MD5:4DBA9C83ECAD5B5A099CC1AA78D391B0
                                                                                      SHA1:FFCC77D7964BD16BD8A554FB437BCF4F2FC8958E
                                                                                      SHA-256:3A89A6834DDBE4A3A6A1CB8C1A1F9579259E7FD6C6C55DE21DCD4807753D8E48
                                                                                      SHA-512:21212AFE8917C0F3BBED433B510C4FCE671B0DA887A1C7338A18CD5409B1A95E766510A9E636E5AA3AB0BA21D7D2C00A462FEBB10D4567A343B85AFE6A3E2394
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Dawson) {. {-9223372036854775808 -33460 0 LMT}. {-2188996940 -32400 0 YST}. {-1632056400 -28800 1 YDT}. {-1615125600 -32400 0 YST}. {-1596978000 -28800 1 YDT}. {-1583164800 -32400 0 YST}. {-880203600 -28800 1 YWT}. {-769395600 -28800 1 YPT}. {-765381600 -32400 0 YST}. {-147884400 -25200 1 YDDT}. {-131554800 -32400 0 YST}. {315561600 -28800 0 PST}. {325677600 -25200 1 PDT}. {341398800 -28800 0 PST}. {357127200 -25200 1 PDT}. {372848400 -28800 0 PST}. {388576800 -25200 1 PDT}. {404902800 -28800 0 PST}. {420026400 -25200 1 PDT}. {436352400 -28800 0 PST}. {452080800 -25200 1 PDT}. {467802000 -28800 0 PST}. {483530400 -25200 1 PDT}. {499251600 -28800 0 PST}. {514980000 -25200 1 PDT}. {530701200 -28800 0 PST}. {544615200 -25200 1 PDT}. {562150800 -28800 0 PST}. {576064800 -25200 1 PDT}. {594205200 -28800 0 PST}. {607514400 -25200 1 PDT}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1876
                                                                                      Entropy (8bit):3.9458112723626755
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQ4eJ58IlJ14RsT8X+km8VnynhBZ2c4Y+O4A5W5xDICW2n7oZA8QZFaIOvkty1H2:5DH0yIRkf12fZGJ5LB6xfZ89Y
                                                                                      MD5:D7E4978775F290809B7C042674F46903
                                                                                      SHA1:E94DB1EBB6A1594ED1A5AEA48B52395482D06085
                                                                                      SHA-256:2E6CFFE8E0C1FE93F55B1BD01F96AA1F3CE645BC802C061CB4917318E30C4494
                                                                                      SHA-512:1FF3CD58A4C4DEC7538F0816E93E6577C51B0045CF36190FF4D327E81FB8282ADDB0EF20BD78A838ABD507EBAD1C187F2A20CC7840E2325B9C326EC449897B45
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Dawson_Creek) {. {-9223372036854775808 -28856 0 LMT}. {-2713881544 -28800 0 PST}. {-1632060000 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-725817600 -28800 0 PST}. {-715788000 -25200 1 PDT}. {-702486000 -28800 0 PST}. {-684338400 -25200 1 PDT}. {-671036400 -28800 0 PST}. {-652888800 -25200 1 PDT}. {-639586800 -28800 0 PST}. {-620834400 -25200 1 PDT}. {-608137200 -28800 0 PST}. {-589384800 -25200 1 PDT}. {-576082800 -28800 0 PST}. {-557935200 -25200 1 PDT}. {-544633200 -28800 0 PST}. {-526485600 -25200 1 PDT}. {-513183600 -28800 0 PST}. {-495036000 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463586400 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431532000 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400082400 -25200 1 PDT}. {-386780400 -28800 0 PST}. {-
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8629
                                                                                      Entropy (8bit):3.76966035849006
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:4cGbc2sGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:4c2dVUC2mWBNwWTxyWR
                                                                                      MD5:F641A7F5DE8FCF4ADC1E5A1A2C9DEC53
                                                                                      SHA1:B013EBBE8002C91C0C45A2D389245A1A9194077A
                                                                                      SHA-256:DF5459068DB3C771E41BE8D62FB89A2822CB2A33CF9A5640C6C666AB20ECE608
                                                                                      SHA-512:C2EA07FF21FD6D1A45A87C6AD85DD3929C2B56E66A52D23103DDFF7B2B3B6433EC5EBFC17BED0F9C0A9AF036F0DF965E12EA3D4463207A128AEF5F6BC12970D7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Denver) {. {-9223372036854775808 -25196 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-1577898000 -25200 0 MST}. {-1570374000 -21600 1 MDT}. {-1551628800 -25200 0 MST}. {-1538924400 -21600 1 MDT}. {-1534089600 -25200 0 MST}. {-883587600 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-757357200 -25200 0 MST}. {-147884400 -21600 1 MDT}. {-131558400 -25200 0 MST}. {-116434800 -21600 1 MDT}. {-100108800 -25200 0 MST}. {-94669200 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8010
                                                                                      Entropy (8bit):3.742999180017181
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:FVzApQaC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:FVspQrn+qvOTFhPI1jFIL
                                                                                      MD5:177B0815E8BD6BFA6E62895FE12A61E5
                                                                                      SHA1:EC2400FA644023D6B3100B52381DB65EAF2606F0
                                                                                      SHA-256:402EC5AB0E99EF6EBB33F4D482EEA5198EC686C7EAE75FC4F7D9B4EF4AC0A9E9
                                                                                      SHA-512:CFA4226A21FDB23C723335F7385EA15436D8A0752EE50C67DA4C1D839BFFD4792EE9AB6E408498CD06C6B8A99A96E95E0B591F7EA17B41C1895ED396438C6D5A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Detroit) {. {-9223372036854775808 -19931 0 LMT}. {-2051202469 -21600 0 CST}. {-1724083200 -18000 0 EST}. {-883594800 -18000 0 EST}. {-880218000 -14400 1 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {-757364400 -18000 0 EST}. {-684349200 -14400 1 EDT}. {-671047200 -18000 0 EST}. {94712400 -18000 0 EST}. {104914800 -14400 1 EDT}. {120636000 -18000 0 EST}. {126687600 -14400 1 EDT}. {152085600 -18000 0 EST}. {157784400 -18000 0 EST}. {167814000 -14400 0 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):203
                                                                                      Entropy (8bit):4.856609165175433
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290TL3290e/:MBaIMY9QpI290Tr290O
                                                                                      MD5:F85ADC16127A74C9B35D16C631E11F4F
                                                                                      SHA1:F7716E20F546AA04697FB0F4993A14BAFDD1825E
                                                                                      SHA-256:67ACF237962E3D12E0C746AEDC7CDBC8579DC7C0A7998AC6B6E169C58A687C17
                                                                                      SHA-512:89E8F9DC6A306912B2DAEE77705E2DCD76E32F403352C23ED6BE34F8BEBB12C3604C20DA11DB921553D20E3FC43EC7984C7103D8D1396AB83B104E70BA6D13B1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Dominica) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8435
                                                                                      Entropy (8bit):3.7724320820194475
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:7tGVgeb0Gm+qI1zXN+C2mWBNQMsmNTxf6AeO+cblX:7heJ/UC2mWBNwWTxyWR
                                                                                      MD5:FECBDD64036247B2FBB723ADD8F798F6
                                                                                      SHA1:60B1719958AD6151CDB174A319A396D5F48C7CF1
                                                                                      SHA-256:EC95041E0A97B37A60EF16A6FA2B6BCB1EBEFABBC9468B828D0F467595132BC2
                                                                                      SHA-512:7CF94EC5040F4C8FA3C6ED30CFDAB59A199C18AA0CDA9A66D1A477F15563D2B7CB872CEEF1E2295E0F3B9A85508A03AEC29E3ECEBE11D9B089A92794D510BA00
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Edmonton) {. {-9223372036854775808 -27232 0 LMT}. {-1998663968 -25200 0 MST}. {-1632063600 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1600614000 -21600 1 MDT}. {-1596816000 -25200 0 MST}. {-1567954800 -21600 1 MDT}. {-1551628800 -25200 0 MST}. {-1536505200 -21600 1 MDT}. {-1523203200 -25200 0 MST}. {-1504450800 -21600 1 MDT}. {-1491753600 -25200 0 MST}. {-1473001200 -21600 1 MDT}. {-1459699200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-715791600 -21600 1 MDT}. {-702489600 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {136371600 -21600 1 MDT}. {152092800 -25200 0 MST}. {167821200 -21600 1 MDT}. {183542400
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1189
                                                                                      Entropy (8bit):3.7118381376452767
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQOX9eptXyss/u/C5/ukCI/uiCk/u8CHe/uOCXs/um4Co/uN3Cc/ux8CL/uiFCyL:5OXUCs5IlTToo4mdGFtapG8dtedJ9fO2
                                                                                      MD5:D6945DF73BA7E12D3B23889CC34F6CFB
                                                                                      SHA1:8C1317F3EF82225A14751318DFDA8904F908C457
                                                                                      SHA-256:71F15943EAD942224B8807CCBB21F9AE34F04619FD76176404633BDB49D9E88C
                                                                                      SHA-512:088C2D7BE44650A044B7632337A1FF8C3CF8A6188F24507C846B9B648FE796466B22D4A322B602B75C2943653FC43C7B9A99AE0AACF9AB7BCC86388EC3953F8A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Eirunepe) {. {-9223372036854775808 -16768 0 LMT}. {-1767208832 -18000 0 -05}. {-1206950400 -14400 1 -05}. {-1191355200 -18000 0 -05}. {-1175367600 -14400 1 -05}. {-1159819200 -18000 0 -05}. {-633812400 -14400 1 -05}. {-622062000 -18000 0 -05}. {-602276400 -14400 1 -05}. {-591825600 -18000 0 -05}. {-570740400 -14400 1 -05}. {-560203200 -18000 0 -05}. {-539118000 -14400 1 -05}. {-531345600 -18000 0 -05}. {-191358000 -14400 1 -05}. {-184190400 -18000 0 -05}. {-155156400 -14400 1 -05}. {-150062400 -18000 0 -05}. {-128890800 -14400 1 -05}. {-121118400 -18000 0 -05}. {-99946800 -14400 1 -05}. {-89582400 -18000 0 -05}. {-68410800 -14400 1 -05}. {-57960000 -18000 0 -05}. {499755600 -14400 1 -05}. {511243200 -18000 0 -05}. {530600400 -14400 1 -05}. {540273600 -18000 0 -05}. {562136400 -14400 1 -05}. {571204800 -18000 0 -05}. {590040000 -18
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):269
                                                                                      Entropy (8bit):4.7060952459188305
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X529078iwTm2OHvJ4YRIgdrV/uFn/acD3/uFn/sVn:MBp5290785mdHx4YlB/uFn/z/uFn/U
                                                                                      MD5:77BE2E0759A3B7227B4DAC601A670D03
                                                                                      SHA1:1FB09211F291E5B1C5CC9848EB53106AF48EE830
                                                                                      SHA-256:40994535FE02326EA9E373F54CB60804BA7AE7162B52EA5F73497E7F72F2D482
                                                                                      SHA-512:EB5E6A4A912053E399F6225A02DDC524A223D4A5724165CAD9009F1FA10B042F971E52CE17B395A86BC80FCC6897FD2CCC3B00708506FEF39E4D71812F5DF595
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/El_Salvador) {. {-9223372036854775808 -21408 0 LMT}. {-1546279392 -21600 0 CST}. {547020000 -18000 1 CDT}. {559717200 -21600 0 CST}. {578469600 -18000 1 CDT}. {591166800 -21600 0 CST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.786739478919165
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qfSwVAIg20qfo2IAcGE7JM7QIAcGEqfu:SlSWB9IZaM3y7eHVAIgpeo2907390eu
                                                                                      MD5:74AB4664E80A145D808CAB004A22859B
                                                                                      SHA1:2AF7665C4E155A227B3F76D1C4BC87854C25A6CB
                                                                                      SHA-256:BDD0893AA5D170F388B1E93CE5FE2EDF438866707E52033E49898AFC499F86C5
                                                                                      SHA-512:CCC2E75E07BA1CAAFD1149A22D07668D191594272922AA2A1CE6DE628A8FF49AD90AA8BFE75C005328820C700B991AD87A6F40DEB5AD519B2708D8F7BF04E5A0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Tijuana)]} {. LoadTimeZoneFile America/Tijuana.}.set TZData(:America/Ensenada) $TZData(:America/Tijuana).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4427
                                                                                      Entropy (8bit):3.8109873978594053
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5aIl06OIRkf12fZGJ5LB6xfZ89Cf5udCLA9ZClqs/K+ff0t9:sIlWf/5LB6xR89C8CgZCHtffW9
                                                                                      MD5:90BBD338049233FAC5596CC63AA0D5B6
                                                                                      SHA1:D96282F5B57CBF823D5A1C1FDDE7907B74DAD770
                                                                                      SHA-256:DD21597BA97FD6591750E83CC00773864D658F32653017C4B52285670FFE52E3
                                                                                      SHA-512:3B0F5801E55EBBB7B4C0F74DDBD3469B8F4C2BFC1B44CC80B0D36DA2152C837C8176695945F61FA75664C04F1266BCA0564815307A2C27E783CD3348C4451E4A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Fort_Nelson) {. {-9223372036854775808 -29447 0 LMT}. {-2713880953 -28800 0 PST}. {-1632060000 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-725817600 -28800 0 PST}. {-715788000 -25200 1 PDT}. {-702486000 -28800 0 PST}. {-684338400 -25200 1 PDT}. {-671036400 -28800 0 PST}. {-652888800 -25200 1 PDT}. {-639586800 -28800 0 PST}. {-620834400 -25200 1 PDT}. {-608137200 -28800 0 PST}. {-589384800 -25200 1 PDT}. {-576082800 -28800 0 PST}. {-557935200 -25200 1 PDT}. {-544633200 -28800 0 PST}. {-526485600 -25200 1 PDT}. {-513183600 -28800 0 PST}. {-495036000 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463586400 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431532000 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400082400 -25200 1 PDT}. {-3
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):226
                                                                                      Entropy (8bit):4.730673843485836
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y73GK7mFVAIgp3GKBL290HXYAp4903GK1:MBaIMY3GK7Hp3GKBL290Hz4903GK1
                                                                                      MD5:4685E4E850E0B6669F72B8E1B4314A0A
                                                                                      SHA1:BC6CCD58A2977A1E125B21D7B8FD57E800E624E1
                                                                                      SHA-256:D35F335D6F575F95CEA4FF53382C0BE0BE94BE7EB8B1E0CA3B7C50E8F7614E4E
                                                                                      SHA-512:867003B33A5FC6E42D546FBFC7A8AB351DE72232B89BA1BEC6DB566F6DCE135E65C08DE9112837190EB21D677E2F83E7E0F6049EC70CB9E36F223DE3A68E000A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Indianapolis)]} {. LoadTimeZoneFile America/Indiana/Indianapolis.}.set TZData(:America/Fort_Wayne) $TZData(:America/Indiana/Indianapolis).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1375
                                                                                      Entropy (8bit):3.695923796037783
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQVeVc4h1u80V2dBUGphmC17ewGtN3rvIh0VBHZDIOXqWoN:5b4h19U2dBUGrmO7XGtN3kh0VBHZUwqX
                                                                                      MD5:2BCCE3C71898F3D7F2327419950C5838
                                                                                      SHA1:CE45568E951C227CB3D88D20B337E5E1E1D4B1EF
                                                                                      SHA-256:AA2CF8DA8D63FC4DE912A4F220CF7E49379021F5E51ABA1AFCFC7C9164D5A381
                                                                                      SHA-512:420066E5D39446AA53547CBF1A015A4745F02D1059B2530B7735AC4C28BD2BFC431AEB7531C2C49C2BDF8E31405F15717D88DE0DE3F5F42BAA96A8289A014D06
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Fortaleza) {. {-9223372036854775808 -9240 0 LMT}. {-1767216360 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8099
                                                                                      Entropy (8bit):3.737123408653655
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:C1V2eXXnqvlrPGgFEUlpde9pXbO53oVmM7IEc2fVGYu2yeB/T/eleWmBk81kS/kQ:CDJv
                                                                                      MD5:3A839112950BFDFD3B5FBD440A2981E4
                                                                                      SHA1:FFDF034F7E26647D1C18C1F6C49C776AD5BA93ED
                                                                                      SHA-256:3D0325012AB7076FB31A68E33EE0EABC8556DFA78FBA16A3E41F986D523858FF
                                                                                      SHA-512:1E06F4F607252C235D2D69E027D7E0510027D8DB0EE49CF291C39D6FD010868EF6899437057DA489DD30981949243DDFA6599FD07CE80E05A1994147B78A76CE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Glace_Bay) {. {-9223372036854775808 -14388 0 LMT}. {-2131646412 -14400 0 AST}. {-1632074400 -10800 1 ADT}. {-1615143600 -14400 0 AST}. {-880221600 -10800 1 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {-536443200 -14400 0 AST}. {-526500000 -10800 1 ADT}. {-513198000 -14400 0 AST}. {-504907200 -14400 0 AST}. {63086400 -14400 0 AST}. {73461600 -10800 1 ADT}. {89182800 -14400 0 AST}. {104911200 -10800 1 ADT}. {120632400 -14400 0 AST}. {126244800 -14400 0 AST}. {136360800 -10800 1 ADT}. {152082000 -14400 0 AST}. {167810400 -10800 1 ADT}. {183531600 -14400 0 AST}. {199260000 -10800 1 ADT}. {215586000 -14400 0 AST}. {230709600 -10800 1 ADT}. {247035600 -14400 0 AST}. {262764000 -10800 1 ADT}. {278485200 -14400 0 AST}. {294213600 -10800 1 ADT}. {309934800 -14400 0 AST}. {325663200 -10800 1 ADT}. {341384400 -14400 0 AST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7186
                                                                                      Entropy (8bit):3.4539479411234977
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:HzC1RFbvHQbnRJ2N+f4hQAa3/paCxwPQg07VvN/W5ylGiGJ3G5cGKQWaT7dZV4gF:t5lfDARzJXC
                                                                                      MD5:F7C502D77495455080AC3125CE2B42EA
                                                                                      SHA1:B4883AF71068903AFA372DBFA9E73A39B658A8FF
                                                                                      SHA-256:058FBB47D5CD3001C0E5A0B5D92ACE1F8A720527A673A78AB71925198AC0ACA1
                                                                                      SHA-512:B0361D7FB7B02C996B9E608F9B8B1D8DB76FC7D298FA9AC841C4C51A0469FF05A06E0F7829E6C7D810D13BDF3B792A9547B70F6721CA9D7544CBD94028364CAB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Godthab) {. {-9223372036854775808 -12416 0 LMT}. {-1686083584 -10800 0 -03}. {323845200 -7200 0 -02}. {338950800 -10800 0 -03}. {354675600 -7200 1 -02}. {370400400 -10800 0 -03}. {386125200 -7200 1 -02}. {401850000 -10800 0 -03}. {417574800 -7200 1 -02}. {433299600 -10800 0 -03}. {449024400 -7200 1 -02}. {465354000 -10800 0 -03}. {481078800 -7200 1 -02}. {496803600 -10800 0 -03}. {512528400 -7200 1 -02}. {528253200 -10800 0 -03}. {543978000 -7200 1 -02}. {559702800 -10800 0 -03}. {575427600 -7200 1 -02}. {591152400 -10800 0 -03}. {606877200 -7200 1 -02}. {622602000 -10800 0 -03}. {638326800 -7200 1 -02}. {654656400 -10800 0 -03}. {670381200 -7200 1 -02}. {686106000 -10800 0 -03}. {701830800 -7200 1 -02}. {717555600 -10800 0 -03}. {733280400 -7200 1 -02}. {749005200 -10800 0 -03}. {764730000 -7200 1 -02}. {780454800 -10800 0 -03
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):10015
                                                                                      Entropy (8bit):3.780383775128893
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:z9zdvd8mSGDcfnrpbXXMqvlrPGgFEUlpd8ESeYPiVFuT/eleWmBk81kS/kV6kefD:z9zdvd7SGgcESeYPiV2Jv
                                                                                      MD5:77DEEF08876F92042F71E1DEFA666857
                                                                                      SHA1:7E21B51B3ED8EBEB85193374174C6E2BCA7FEB7F
                                                                                      SHA-256:87E9C6E265BFA58885FBEC128263D5E5D86CC32B8FFEDECAFE96F773192C18BE
                                                                                      SHA-512:C9AB8C9147354A388AEC5FE04C6C5317481478A07893461706CDC9FD5B42E31733EAC01C95C357F3C5DC3556C49F20374F58A6E0A120755D5E96744DE3A95A81
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Goose_Bay) {. {-9223372036854775808 -14500 0 LMT}. {-2713895900 -12652 0 NST}. {-1640982548 -12652 0 NST}. {-1632076148 -9052 1 NDT}. {-1615145348 -12652 0 NST}. {-1609446548 -12652 0 NST}. {-1096921748 -12600 0 NST}. {-1072989000 -12600 0 NST}. {-1061670600 -9000 1 NDT}. {-1048973400 -12600 0 NST}. {-1030221000 -9000 1 NDT}. {-1017523800 -12600 0 NST}. {-998771400 -9000 1 NDT}. {-986074200 -12600 0 NST}. {-966717000 -9000 1 NDT}. {-954624600 -12600 0 NST}. {-935267400 -9000 1 NDT}. {-922570200 -12600 0 NST}. {-903817800 -9000 1 NDT}. {-891120600 -12600 0 NST}. {-872368200 -9000 0 NWT}. {-769395600 -9000 1 NPT}. {-765401400 -12600 0 NST}. {-757369800 -12600 0 NST}. {-746044200 -9000 1 NDT}. {-733347000 -12600 0 NST}. {-714594600 -9000 1 NDT}. {-701897400 -12600 0 NST}. {-683145000 -9000 1 NDT}. {-670447800 -12600 0 NST}. {-6516954
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7307
                                                                                      Entropy (8bit):3.755018614919114
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:hrZaC3Xm8sHRyvOTFhP5S+ijFnRaJeaX1eyDt:htrn+cvOTFhPI1jFIL
                                                                                      MD5:8582299C1262010B6843306D65DB436C
                                                                                      SHA1:70DB6B507D7F51B1E2C96E087CD7987EB69E9A1D
                                                                                      SHA-256:7CFBA4D1B1E6106A0EC6D6B5600791D6A33AD527B7D47325C3AB9524B17B1829
                                                                                      SHA-512:CC12912C38D85B23242C69211BA2B58167C55836D51DB02E6D820CDBD6368F835893AF656FC81F73EA745FD786E9134EC4A3E8D325D1515A01540E8A7EBEF03B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Grand_Turk) {. {-9223372036854775808 -17072 0 LMT}. {-2524504528 -18430 0 KMT}. {-1827687170 -18000 0 EST}. {284014800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}. {404892000 -18000 0 EST}. {420015600 -14400 1 EDT}. {436341600 -18000 0 EST}. {452070000 -14400 1 EDT}. {467791200 -18000 0 EST}. {483519600 -14400 1 EDT}. {499240800 -18000 0 EST}. {514969200 -14400 1 EDT}. {530690400 -18000 0 EST}. {544604400 -14400 1 EDT}. {562140000 -18000 0 EST}. {576054000 -14400 1 EDT}. {594194400 -18000 0 EST}. {607503600 -14400 1 EDT}. {625644000 -18000 0 EST}. {638953200 -14400 1 EDT}. {657093600 -18000 0 EST}. {671007600 -14400 1 EDT}. {688543200 -18000 0 EST}. {702457200 -14400 1 EDT}. {71
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):202
                                                                                      Entropy (8bit):4.877543794488217
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX2905Qb90e/:MBaIMY9QpI290Ob90O
                                                                                      MD5:C62E81B423F5BA10709D331FEBAB1839
                                                                                      SHA1:F7BC5E7055E472DE33DED5077045F680843B1AA7
                                                                                      SHA-256:0806C0E907DB13687BBAD2D22CEF5974D37A407D00E0A97847EC12AF972BCFF3
                                                                                      SHA-512:7D7090C3A6FEBE67203EB18E06717B39EC62830757BAD5A40E0A7F97572ABB81E81CAB614AA4CD3089C3787DAA6293D6FED0137BB57EF3AE358A92FCDDCF52A8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Grenada) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):205
                                                                                      Entropy (8bit):4.914669229343752
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX2905AJLr490e/:MBaIMY9QpI290qJLr490O
                                                                                      MD5:026A098D231C9BE8557A7F4A673C1BE2
                                                                                      SHA1:192EECA778E1E713053D37353AF6D3C168D2BFF5
                                                                                      SHA-256:FFE0E204D43000121944C57D2B2A846E792DDC73405C02FC5E8017136CD55BCB
                                                                                      SHA-512:B49BD0FC12CC8D475E7E5116B8BDEA1584912BFA433734451F4338E42B5E042F3EC259E81C009E85798030E21F658158FA9F4EFC60078972351F706F852425E3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Guadeloupe) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):385
                                                                                      Entropy (8bit):4.450029420195016
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52906GdJmdHKznI2f/uFn/z/uFn/w67Rd3/uFn/4Bx/uFn/xAQ:cQ8JeQXfSn/zSn/w67Rd3Sn/4HSn/j
                                                                                      MD5:6E3FD9D19E0CD26275B0F95412F13F4C
                                                                                      SHA1:A1B6D6219DEBDBC9B5FFF5848E5DF14F8F4B1158
                                                                                      SHA-256:1DC103227CA0EDEEBA8EE8A41AE54B3E11459E4239DC051B0694CF7DF3636F1A
                                                                                      SHA-512:BF615D16BB55186AFC7216B47250EE84B7834FD08077E29E0A8F49C65AACAAD8D27539EA751202EBFF5E0B00702EC59B0A7D95F5FB585BFED68AC6206416110D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Guatemala) {. {-9223372036854775808 -21724 0 LMT}. {-1617040676 -21600 0 CST}. {123055200 -18000 1 CDT}. {130914000 -21600 0 CST}. {422344800 -18000 1 CDT}. {433054800 -21600 0 CST}. {669708000 -18000 1 CDT}. {684219600 -21600 0 CST}. {1146376800 -18000 1 CDT}. {1159678800 -21600 0 CST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):240
                                                                                      Entropy (8bit):4.690879495223713
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X529056m2OHHjGeP5lahicKpKV91EX/uFkfF/KV9C:MBp5290smdHHLP5C/gO9U/uFEF/O9C
                                                                                      MD5:58E0902DC63F2F584AD72E6855A68BB8
                                                                                      SHA1:C8ED225C95DB512CB860D798E6AF648A321B82E7
                                                                                      SHA-256:D940627FFCBE6D690E34406B62EE4A032F116DF1AB81631E27A61E16BD4051E2
                                                                                      SHA-512:EF2523F2C55890BE4CE78DA2274833647587CF6F48B144C8261EB69B24BA73946B63244F03FEDF37A990FCAFECB2D88F4ECE302993F115C06323721E570EDD99
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Guayaquil) {. {-9223372036854775808 -19160 0 LMT}. {-2524502440 -18840 0 QMT}. {-1230749160 -18000 0 -05}. {722926800 -14400 1 -05}. {728884800 -18000 0 -05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):208
                                                                                      Entropy (8bit):4.687194013851928
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52905R3Lm2OHRjGeTShVy4yViUKcVVFAH/MIB/O9:MBp5290LLmdHVTiy4yVi7c/OH/MG/O9
                                                                                      MD5:CF5AD3AFBD735A42E3F7D85064C16AFC
                                                                                      SHA1:B8160F8D5E677836051643622262F13E3AE1B0BE
                                                                                      SHA-256:AF2EC2151402DF377E011618512BBC25A5A6AC64165E2C42212E2C2EC182E8F1
                                                                                      SHA-512:F69F10822AB115D25C0B5F705D294332FAAA66EB0BA2D98A6610A35E1FA5ED05F02B3DDBB4E37B9B4A77946C05E28C98113DBF11EDF8DB2661A2D8ED40711182
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Guyana) {. {-9223372036854775808 -13960 0 LMT}. {-1730578040 -13500 0 -0345}. {176010300 -10800 0 -03}. {662698800 -14400 0 -04}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):10763
                                                                                      Entropy (8bit):3.724988391778253
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Y7Z1hubfVmv0SqJXDiFHrbm96qddObEn/RDzWRfQFQ4XL8vG+81VcfnrpbXXnqvo:823ZLYvuOZJv
                                                                                      MD5:7DE8E355A725B3D9B3FD06A838B9715F
                                                                                      SHA1:41C6AAEA03FC7FEED50CFFFC4DFF7F35E2B1C23D
                                                                                      SHA-256:5F65F38FFA6B05C59B21DB98672EB2124E4283530ACB01B22093EAEFB256D116
                                                                                      SHA-512:4C61A15DDF28124343C1E6EFE068D15E48F0662534486EC38A4E2731BE085CDA5856F884521EF32A6E0EDD610A8A491A722220BDD1BAF2A9652D8457778AF696
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Halifax) {. {-9223372036854775808 -15264 0 LMT}. {-2131645536 -14400 0 AST}. {-1696276800 -10800 1 ADT}. {-1680469200 -14400 0 AST}. {-1640980800 -14400 0 AST}. {-1632074400 -10800 1 ADT}. {-1615143600 -14400 0 AST}. {-1609444800 -14400 0 AST}. {-1566763200 -10800 1 ADT}. {-1557090000 -14400 0 AST}. {-1535486400 -10800 1 ADT}. {-1524949200 -14400 0 AST}. {-1504468800 -10800 1 ADT}. {-1493413200 -14400 0 AST}. {-1472414400 -10800 1 ADT}. {-1461963600 -14400 0 AST}. {-1440964800 -10800 1 ADT}. {-1429390800 -14400 0 AST}. {-1409515200 -10800 1 ADT}. {-1396731600 -14400 0 AST}. {-1376856000 -10800 1 ADT}. {-1366491600 -14400 0 AST}. {-1346616000 -10800 1 ADT}. {-1333832400 -14400 0 AST}. {-1313956800 -10800 1 ADT}. {-1303678800 -14400 0 AST}. {-1282507200 -10800 1 ADT}. {-1272661200 -14400 0 AST}. {-1251057600 -10800 1 ADT}. {-1240088400
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8444
                                                                                      Entropy (8bit):3.7372403334059547
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:VXA0Bc0tTJtNliQ4sxgpuG4c2JPTxUw9Or2ocrPGSyM9Gk4LK46MCf7VkXgySCWv:VXA0Bc0tTJtNliQ4sxSuG4c2JPTxUw9F
                                                                                      MD5:C436FDCDBA98987601FEFC2DBFD5947B
                                                                                      SHA1:A04CF2A5C9468C634AED324CB79F9EE3544514B7
                                                                                      SHA-256:32F8B4D03E4ACB466353D72DAA2AA9E1E42D454DBBA001D0B880667E6346B8A1
                                                                                      SHA-512:56C25003685582AF2B8BA4E32EFF03EF10F4360D1A12E0F1294355000161ADDF7024CBD047D1830AB884BE2C385FD8ABE8DA5C30E9A0671C22E84EE3BF957D85
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Havana) {. {-9223372036854775808 -19768 0 LMT}. {-2524501832 -19776 0 HMT}. {-1402813824 -18000 0 CST}. {-1311534000 -14400 1 CDT}. {-1300996800 -18000 0 CST}. {-933534000 -14400 1 CDT}. {-925675200 -18000 0 CST}. {-902084400 -14400 1 CDT}. {-893620800 -18000 0 CST}. {-870030000 -14400 1 CDT}. {-862171200 -18000 0 CST}. {-775681200 -14400 1 CDT}. {-767822400 -18000 0 CST}. {-744231600 -14400 1 CDT}. {-736372800 -18000 0 CST}. {-144702000 -14400 1 CDT}. {-134251200 -18000 0 CST}. {-113425200 -14400 1 CDT}. {-102542400 -18000 0 CST}. {-86295600 -14400 1 CDT}. {-72907200 -18000 0 CST}. {-54154800 -14400 1 CDT}. {-41457600 -18000 0 CST}. {-21495600 -14400 1 CDT}. {-5774400 -18000 0 CST}. {9954000 -14400 1 CDT}. {25675200 -18000 0 CST}. {41403600 -14400 1 CDT}. {57729600 -18000 0 CST}. {73458000 -14400 1 CDT}. {87364800 -18000 0 CST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):595
                                                                                      Entropy (8bit):4.2803367804689785
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp5290ebmdH5NWw+Ux++vTQtFlvm0tFXtFjV5a:cQBe5gfUT7UFltF9FjV5a
                                                                                      MD5:9D1A1746614CE2CEE26D066182938CDC
                                                                                      SHA1:967590403A84E80ED299B8D548A2B37C8EEB21CE
                                                                                      SHA-256:493DB3E7B56B2E6B266A5C212CD1F75F1E5CF57533DA03BB1C1F2449543B9F48
                                                                                      SHA-512:DFAE6BC48F2E4B75DD6744AEE57D31D6A6E764D02DCA5731C7B516AD87B9BAB2FEB355A012EC38BDD53008B501B0744953EB7E0677F02B9EAF083D2E66042B37
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Hermosillo) {. {-9223372036854775808 -26632 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {-873828000 -25200 0 MST}. {-661539600 -28800 0 PST}. {28800 -25200 0 MST}. {828867600 -21600 1 MDT}. {846403200 -25200 0 MST}. {860317200 -21600 1 MDT}. {877852800 -25200 0 MST}. {891766800 -21600 1 MDT}. {909302400 -25200 0 MST}. {915174000 -25200 0 MST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6996
                                                                                      Entropy (8bit):3.799188069575817
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:uRXxWMzJ2eQzURWu3N7sHRwvOTFhP5S+ijFnRaJeaX1eyDt:uRXxWUJ2eQzURWu3NOqvOTFhPI1jFIL
                                                                                      MD5:154A332C3ACF6D6F358B07D96B91EBD1
                                                                                      SHA1:FC16E7CBE179B3AB4E0C2A61AB5E0E8C23E50D50
                                                                                      SHA-256:C0C7964EBF9EA332B46D8B928B52FDE2ED15ED2B25EC664ACD33DA7BF3F987AE
                                                                                      SHA-512:5831905E1E6C6FA9DD309104B3A2EE476941D6FF159764123A477E2690C697B0F19EDEA0AD0CD3BBBECF96D64DC4B981027439E7865FCB1632661C8539B3BD6C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Indianapolis) {. {-9223372036854775808 -20678 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-1577901600 -21600 0 CST}. {-900259200 -18000 1 CDT}. {-891795600 -21600 0 CST}. {-883591200 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-702493200 -21600 0 CST}. {-684345600 -18000 1 CDT}. {-671043600 -21600 0 CST}. {-652896000 -18000 1 CDT}. {-639594000 -21600 0 CST}. {-620841600 -18000 1 CDT}. {-608144400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8470
                                                                                      Entropy (8bit):3.7546412701514034
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:AXxr2eQzURWu3Oab9BxXI6X8xYIIOdXkqbfkeTzZSJw5/9/yuvQ+hcr8bYkzbXw6:AXxr2eQzUwu3Oab9BxXI6XUYIIOdXkqv
                                                                                      MD5:E8AFD9E320A7F4310B413F8086462F31
                                                                                      SHA1:7BEE624AAC096E9C280B4FC84B0671381C657F6C
                                                                                      SHA-256:BE74C1765317898834A18617352DF3B2952D69DE4E294616F1554AB95824DAF0
                                                                                      SHA-512:C76620999A293FA3A93CA4615AB78F19395F12CC08C242F56BFD4C4CAF8BC769DDEBF33FF10F7DA5A3EFD8ED18792362780188636075419014A8C099A897C43C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Knox) {. {-9223372036854775808 -20790 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-725824800 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-702493200 -21600 0 CST}. {-684345600 -18000 1 CDT}. {-671043600 -21600 0 CST}. {-652896000 -18000 1 CDT}. {-639594000 -21600 0 CST}. {-620841600 -18000 1 CDT}. {-608144400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-463593600 -18000 1 CDT}. {-447267600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-415818000 -21600 0 CST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7037
                                                                                      Entropy (8bit):3.786429098558221
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:FXx3knO559B18XWRh0ksHRwvOTFhP5S+ijFnRaJeaX1eyDt:FXxUnO559B2XWRh0pqvOTFhPI1jFIL
                                                                                      MD5:456422A0D5BE8FBF5DBD0E75D8650894
                                                                                      SHA1:737AC21F019A7E89689B9C8B465C8482FF4F403E
                                                                                      SHA-256:C92D86CACFF85344453E1AFBC124CE11085DE7F6DC52CB4CBE6B89B01D5FE2F3
                                                                                      SHA-512:372AEBB2F13A50536C36A025881874E5EE3162F0168B71B2083965BECBBFCA3DAC726117D205D708CC2B4F7ABE65CCC2B3FE6625F1403D97001950524D545470
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Marengo) {. {-9223372036854775808 -20723 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-599594400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-463593600 -18000 1 CDT}. {-450291600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-418237200 -21600 0 CST}. {-400089600 -18000 1 CDT}. {-386787600 -21600 0 CST}. {-368640000 -18000 1 CDT}. {-355338000 -21600 0 CST}. {-337190400 -18000 1 CDT}. {-323888400 -21600 0 CST}. {-305740800 -18000 1 CDT}. {-292438800 -21600 0 CST}. {-273686400 -18000 0 EST}. {-31518000 -18000 0 EST}. {-21488400 -14400 1 EDT}. {-5767200 -18000 0 EST}. {
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7364
                                                                                      Entropy (8bit):3.79636789874872
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:pXxS559B2XW6X8x3X3D2D8IOdXkqbfkeTzlbaqvOTFhPI1jFIL:pXxS559B2XW6XU3X3D2D8IOdXkqbfNT2
                                                                                      MD5:9614153F9471187A2F92B674733369A0
                                                                                      SHA1:199E8D5018A374EDB9592483CE4DDB30712006E3
                                                                                      SHA-256:5323EBC8D450CC1B53AED18AD209ADEB3A6EEB5A00A80D63E26DB1C85B6476ED
                                                                                      SHA-512:2A1E26D711F62C51A5EE7014584FAF41C1780BD62573247D45D467500C6AB9A9EAD5A382A1986A9D768D7BB927E4D391EA1B7A4AD9A54D3B05D8AD2385156C33
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Petersburg) {. {-9223372036854775808 -20947 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-473364000 -21600 0 CST}. {-462996000 -18000 1 CDT}. {-450291600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-418237200 -21600 0 CST}. {-400089600 -18000 1 CDT}. {-386787600 -21600 0 CST}. {-368640000 -18000 1 CDT}. {-355338000 -21600 0 CST}. {-337190400 -18000 1 CDT}. {-323888400 -21600 0 CST}. {-305740800 -18000 1 CDT}. {-292438800 -21600 0 CST}. {-273686400 -18000 1 CDT}. {-257965200 -21600 0 CST}. {-242236800 -18000 1 CDT}. {-226515600 -21600 0 CST}. {-210787200 -18000 1 CDT}. {-195066000 -21600 0 CST}. {-179337600 -18000 1 CDT}. {-163616400 -21600 0 CST
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6992
                                                                                      Entropy (8bit):3.7768650637181533
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:CXxjL36559B2XI6XE3X3D2E0bYkzbXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3g:CXxjL36559B2XI6XE3X3D2E0bYkzbXw6
                                                                                      MD5:D0F40504B578D996E93DAE6DA583116A
                                                                                      SHA1:4D4D24021B826BFED2735D42A46EEC1C9EBEA8E3
                                                                                      SHA-256:F4A0572288D2073D093A256984A2EFEC6DF585642EA1C4A2860B38341D376BD8
                                                                                      SHA-512:BA9D994147318FF5A53D45EC432E118B5F349207D58448D568E0DB316452EF9FD620EE4623FD4EAD123BC2A6724E1BAE2809919C58223E6FD4C7A20F004155E0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Tell_City) {. {-9223372036854775808 -20823 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-462996000 -18000 1 CDT}. {-450291600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-418237200 -21600 0 CST}. {-400089600 -18000 1 CDT}. {-386787600 -21600 0 CST}. {-368640000 -18000 1 CDT}. {-355338000 -21600 0 CST}. {-337190400 -18000 1 CDT}. {-323888400 -21600 0 CST}. {-305740800 -18000 1 CDT}. {-289414800 -21600 0 CST}. {-273686400 -18000 1 CDT}. {-260989200 -21600 0 CST}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6350
                                                                                      Entropy (8bit):3.782861360101505
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:K9Xx3+lsHRwvOTFhP5S+ijFnRaJeaX1eyDt:6XxuoqvOTFhPI1jFIL
                                                                                      MD5:35A64C161E0083DCE8CD1E8E1D6EBE85
                                                                                      SHA1:9BC295C23783C07587D82DA2CC25C1A4586284B2
                                                                                      SHA-256:75E89796C6FB41D75D4DDA6D94E4D27979B0572487582DC980575AF6656A7822
                                                                                      SHA-512:7BAF735DA0DE899653F60EED6EEF53DD8A1ABC6F61F052B8E37B404BC9B37355E94563827BC296D8E980C4247864A57A117B7B1CB58A2C242991BBDC8FE7174E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Vevay) {. {-9223372036854775808 -20416 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-495043200 -18000 0 EST}. {-31518000 -18000 0 EST}. {-21488400 -14400 1 EDT}. {-5767200 -18000 0 EST}. {9961200 -14400 1 EDT}. {25682400 -18000 0 EST}. {41410800 -14400 1 EDT}. {57736800 -18000 0 EST}. {73465200 -14400 1 EDT}. {89186400 -18000 0 EST}. {94712400 -18000 0 EST}. {1136091600 -18000 0 EST}. {1143961200 -14400 1 EDT}. {1162101600 -18000 0 EST}. {1173596400 -14400 1 EDT}. {1194156000 -18000 0 EST}. {1205046000 -14400 1 EDT}. {1225605600 -18000 0 EST}. {1236495600 -14400 1 EDT}. {1257055200 -18000 0 EST}. {1268550000 -14400 1 EDT}. {1289109600 -18000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6992
                                                                                      Entropy (8bit):3.795913753683276
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:TXxjL36559B2XI6XE3X3D2E0baqvOTFhPI1jFIL:TXxjL36559B2XI6XE3X3D2E0bZ3+
                                                                                      MD5:AD8B44BD0DBBEB06786B2B281736A82B
                                                                                      SHA1:7480D3916F0ED66379FC534F20DC31001A3F14AF
                                                                                      SHA-256:18F35F24AEF9A937CD9E91E723F611BC5D802567A03C5484FAB7AEEC1F2A0ED0
                                                                                      SHA-512:7911EC3F1FD564C50DEAF074ED99A502A9B5262B63E3E0D2901E21F27E90FBD5656A53831E61B43A096BA1FF18BB4183CCCE2B903782C2189DAAFDD7A90B3083
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Vincennes) {. {-9223372036854775808 -21007 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-462996000 -18000 1 CDT}. {-450291600 -21600 0 CST}. {-431539200 -18000 1 CDT}. {-418237200 -21600 0 CST}. {-400089600 -18000 1 CDT}. {-386787600 -21600 0 CST}. {-368640000 -18000 1 CDT}. {-355338000 -21600 0 CST}. {-337190400 -18000 1 CDT}. {-323888400 -21600 0 CST}. {-305740800 -18000 1 CDT}. {-289414800 -21600 0 CST}. {-273686400 -18000 1 CDT}. {-260989200 -21600 0 CST}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7170
                                                                                      Entropy (8bit):3.7942292979267767
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:YXxjJ2eQzURWu3Oab9B2XWR0/qvOTFhPI1jFIL:YXxjJ2eQzUwu3Oab9B2XWR0M3+
                                                                                      MD5:40D8E05D8794C9D11DF018E3C8B8D7C0
                                                                                      SHA1:58161F320CB46EC72B9AA6BAD9086F18B2E0141B
                                                                                      SHA-256:A13D6158CCD4283FE94389FD341853AD90EA4EC505D37CE23BD7A6E7740F03F6
                                                                                      SHA-512:BC45B6EFF1B879B01F517D4A4012D0AFBA0F6A9D92E862EF9A960FE07CBE216C8C929FE790044C566DC95981EC4BEAB3DCBD45A1FE597606CF601214A78AEA08
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Indiana/Winamac) {. {-9223372036854775808 -20785 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-702493200 -21600 0 CST}. {-684345600 -18000 1 CDT}. {-671043600 -21600 0 CST}. {-652896000 -18000 1 CDT}. {-639594000 -21600 0 CST}. {-620841600 -18000 1 CDT}. {-608144400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-463593600 -18000 1 CDT}. {-447267600 -21600 0 CST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):228
                                                                                      Entropy (8bit):4.655121947675421
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y73GK7mFVAIgp3GKBL2903GfJ4903GK1:MBaIMY3GK7Hp3GKBL2903GfJ4903GK1
                                                                                      MD5:CB79BE371FAB0B0A5EBEB1BA101AA8BA
                                                                                      SHA1:6A24348AB24D6D55A8ABDEE1500ED03D5D1357F3
                                                                                      SHA-256:6AABF28AC5A766828DD91F2EE2783F50E9C6C6307D8942FCD4DFAE21DB2F1855
                                                                                      SHA-512:156E1E7046D7A0938FE4BF40BC586F0A7BEF1B0ED7B887665E9C6041980B511F079AA739B7BD42A89794CB9E82DB6629E81DD39D2F8161DFABDED539E272FB6E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Indianapolis)]} {. LoadTimeZoneFile America/Indiana/Indianapolis.}.set TZData(:America/Indianapolis) $TZData(:America/Indiana/Indianapolis).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7389
                                                                                      Entropy (8bit):3.778898781146325
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:/ZGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:/EVUC2mWBNwWTxyWR
                                                                                      MD5:EFEFB694C4F54583C0ED45A955E823AF
                                                                                      SHA1:6FF35D151E8E1DED0DC362671FFF904B3CFF59B4
                                                                                      SHA-256:72C48C0CCC1B8C1BD80E5BB5B8879A07A2DBE82317667568523BBE1F855E4883
                                                                                      SHA-512:52BDACF02C5A595927FF9B7DC0151367C81B259C8831A91F66A0C10D5271DCDF834763F44868CCF7EDA497295D9D55C49C8F8FD43EEC383C29BC3CABAA4B6B0F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Inuvik) {. {-9223372036854775808 0 0 -00}. {-536457600 -28800 0 PST}. {-147888000 -21600 1 PDDT}. {-131558400 -28800 0 PST}. {315558000 -25200 0 MST}. {325674000 -21600 1 MDT}. {341395200 -25200 0 MST}. {357123600 -21600 1 MDT}. {372844800 -25200 0 MST}. {388573200 -21600 1 MDT}. {404899200 -25200 0 MST}. {420022800 -21600 1 MDT}. {436348800 -25200 0 MST}. {452077200 -21600 1 MDT}. {467798400 -25200 0 MST}. {483526800 -21600 1 MDT}. {499248000 -25200 0 MST}. {514976400 -21600 1 MDT}. {530697600 -25200 0 MST}. {544611600 -21600 1 MDT}. {562147200 -25200 0 MST}. {576061200 -21600 1 MDT}. {594201600 -25200 0 MST}. {607510800 -21600 1 MDT}. {625651200 -25200 0 MST}. {638960400 -21600 1 MDT}. {657100800 -25200 0 MST}. {671014800 -21600 1 MDT}. {688550400 -25200 0 MST}. {702464400 -21600 1 MDT}. {720000000 -25200 0 MST}. {733914000 -
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7421
                                                                                      Entropy (8bit):3.7475594770809835
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:0/GC3XmzdsHRwvOTFhP5S+ijFnRaJeaX1eyDt:0/Pn0gqvOTFhPI1jFIL
                                                                                      MD5:67B9C859DCD38D60EB892500D7287387
                                                                                      SHA1:E91BE702B1D97039528A3F540D1FFFF553683CE9
                                                                                      SHA-256:34D907D9F2B36DC562DCD4E972170011B4DA98F9F6EDA819C50C130A51F1DBED
                                                                                      SHA-512:239B0BA842C1432DB5A6DE4E0A63CDE4B4800FC76AE237B0E723116426F0700FFF418634FB1B5641B87E7792709E16A9ED679E37A570E9D723E3561C2B6B45B5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Iqaluit) {. {-9223372036854775808 0 0 -00}. {-865296000 -14400 0 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {-147898800 -10800 1 EDDT}. {-131569200 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}. {404892000 -18000 0 EST}. {420015600 -14400 1 EDT}. {436341600 -18000 0 EST}. {452070000 -14400 1 EDT}. {467791200 -18000 0 EST}. {483519600 -14400 1 EDT}. {499240800 -18000 0 EST}. {514969200 -14400 1 EDT}. {530690400 -18000 0 EST}. {544604400 -14400 1 EDT}. {562140000 -18000 0 EST}. {576054000 -14400 1 EDT}. {594194400 -18000 0 EST}. {607503600 -14400 1 EDT}. {625644000 -18000 0 EST}. {638953200 -14400 1 EDT}. {657093600 -18000 0 EST}. {671007600 -14400 1 EDT}. {688543200 -18000 0 EST}. {702457200 -14400 1 EDT}. {71999280
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):818
                                                                                      Entropy (8bit):4.132568007446054
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQ1ewtWFD/u/Ip/uJD/u2lR/utzN54i/uhU/ufUF5/uDBq/u63gU/u3Zh/u4u8H:5htWFYIgxmzfwuFqBG3g/k8H
                                                                                      MD5:5C35FFB7D73B7F46DB4A508CF7AB1C54
                                                                                      SHA1:5C631104044E9413C86F95E072A630C2AD9EA56D
                                                                                      SHA-256:7FDD008C250308942D0D1DE485B05670A6A4276CB61F5F052385769B7E1906C1
                                                                                      SHA-512:7B3FF2C945598DDBF43B0BD0650192D6C70B333BF89916013C35F56DC1489CB65A72BA70FB0AE7341C71A71D4B73805F9D597A5B5FA525F4BFB1DF0F582641AE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Jamaica) {. {-9223372036854775808 -18430 0 LMT}. {-2524503170 -18430 0 KMT}. {-1827687170 -18000 0 EST}. {126248400 -18000 0 EST}. {126687600 -14400 1 EDT}. {152085600 -18000 0 EST}. {162370800 -14400 1 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}. {404892000 -18000 0 EST}. {420015600 -14400 1 EDT}. {436341600 -18000 0 EST}. {441781200 -18000 0 EST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):206
                                                                                      Entropy (8bit):4.89710274358395
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7/MI1VAIgp/MI+290pPGe90/MIE:MBaIMY/Mvp/Mh290h390/MB
                                                                                      MD5:320C83EFE59FD60EB9F5D4CF0845B948
                                                                                      SHA1:5A71DFAE7DF9E3D8724DFA533A37744B9A34FFEC
                                                                                      SHA-256:67740B2D5427CFCA70FB53ABD2356B62E01B782A51A805A324C4DFAD9ACA0CFA
                                                                                      SHA-512:D7A6378372386C45C907D3CB48B923511A719794B0C0BFA3694DBCE094A46A48249720653836C2F10CBB2178DD8EEEEA6B5019E4CC6C6B650FD7BE256BE1CA99
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Jujuy)]} {. LoadTimeZoneFile America/Argentina/Jujuy.}.set TZData(:America/Jujuy) $TZData(:America/Argentina/Jujuy).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8406
                                                                                      Entropy (8bit):3.8821515247187883
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:sL19jPaps/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:sB9jPP/4h5sBPy+CMt/ElALLVuAH
                                                                                      MD5:7D338E0224E7DDC690766CDC3E436805
                                                                                      SHA1:89BB26B7731AC40DE75FFCD854BA4D30A0F1B716
                                                                                      SHA-256:B703FC5AA56667A5F27FD80E5042AFE0F22F5A7EF7C5174646B2C10297E16810
                                                                                      SHA-512:7B52EDD2FE3ECAB682138EC867B4D654A08BEA9C4A3BB20E1ED69F03DD9EF91A3B707C78D25CA5A32938152157E98188A253AD2D2D283EF24ECE7352BCB88B67
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Juneau) {. {-9223372036854775808 54139 0 LMT}. {-3225223727 -32261 0 LMT}. {-2188954939 -28800 0 PST}. {-883584000 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-31507200 -28800 0 PST}. {-21477600 -25200 1 PDT}. {-5756400 -28800 0 PST}. {9972000 -25200 1 PDT}. {25693200 -28800 0 PST}. {41421600 -25200 1 PDT}. {57747600 -28800 0 PST}. {73476000 -25200 1 PDT}. {89197200 -28800 0 PST}. {104925600 -25200 1 PDT}. {120646800 -28800 0 PST}. {126698400 -25200 1 PDT}. {152096400 -28800 0 PST}. {162381600 -25200 1 PDT}. {183546000 -28800 0 PST}. {199274400 -25200 1 PDT}. {215600400 -28800 0 PST}. {230724000 -25200 1 PDT}. {247050000 -28800 0 PST}. {262778400 -25200 1 PDT}. {278499600 -28800 0 PST}. {294228000 -25200 1 PDT}. {309949200 -28800 0 PST}. {325677600
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9332
                                                                                      Entropy (8bit):3.769996646995791
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:wmXxSkUArUfxLURWu3O5bMQxXI6Xah0drn+qvOTFhPI1jFIL:wmXxSkUArUfxLUwu3O5bMQxXI6Xah2n8
                                                                                      MD5:D9BC20AFD7DA8643A2091EB1A4B48CB3
                                                                                      SHA1:9B567ABF6630E7AB231CAD867AD541C82D9599FF
                                                                                      SHA-256:B4CC987A6582494779799A32A9FB3B4A0D0298425E71377EB80E2FB4AAAEB873
                                                                                      SHA-512:0BC769A53E63B41341C25A0E2093B127064B589F86483962BD24DB4082C4466E12F4CD889B82AD0134C992E984EF0897113F28321522B57BA45A98C15FF7E172
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Kentucky/Louisville) {. {-9223372036854775808 -20582 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-1546279200 -21600 0 CST}. {-1535904000 -18000 1 CDT}. {-1525280400 -21600 0 CST}. {-905097600 -18000 1 CDT}. {-891795600 -21600 0 CST}. {-883591200 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-744224400 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-684349200 -18000 1 CDT}. {-652899600 -18000 1 CDT}. {-620845200 -18000 1 CDT}. {-608144400 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8279
                                                                                      Entropy (8bit):3.785637200740036
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:jFPXxEOdXkqbfkeTzZSJw5/9/yuvQ+hcrD57X0N41+gqvOTFhPI1jFIL:5PXxEOdXkqbfNTzZSJw5/9/yuvQ6crD9
                                                                                      MD5:0C6F5C9D1514DF2D0F8044BE27080EE2
                                                                                      SHA1:70CBA0561E4319027C60FB0DCF29C9783BFE8A75
                                                                                      SHA-256:1515460FBA496FE8C09C87C51406F4DA5D77C11D1FF2A2C8351DF5030001450F
                                                                                      SHA-512:17B519BCC044FE6ED2F16F2DFBCB6CCE7FA83CF17B9FC4A40FDA21DEFBA9DE7F022A50CF5A264F3090D57D51362662E01C3C60BD125430AEECA0887BB8520DB1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Kentucky/Monticello) {. {-9223372036854775808 -20364 0 LMT}. {-2717647200 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-63136800 -21600 0 CST}. {-52934400 -18000 1 CDT}. {-37213200 -21600 0 CST}. {-21484800 -18000 1 CDT}. {-5763600 -21600 0 CST}. {9964800 -18000 1 CDT}. {25686000 -21600 0 CST}. {41414400 -18000 1 CDT}. {57740400 -21600 0 CST}. {73468800 -18000 1 CDT}. {89190000 -21600 0 CST}. {104918400 -18000 1 CDT}. {120639600 -21600 0 CST}. {126691200 -18000 1 CDT}. {152089200 -21600 0 CST}. {162374400 -18000 1 CDT}. {183538800 -21600 0 CST}. {199267200 -18000 1 CDT}. {215593200 -21600 0 CST}. {230716800 -18000 1 CDT}. {247042800 -21600 0 C
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):199
                                                                                      Entropy (8bit):4.8191308888643345
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y73GKXFVAIgp3GK4N2901iZ903GKk:MBaIMY3GKXQp3GKe290Q903GKk
                                                                                      MD5:465D405C9720EB7EC4BB007A279E88ED
                                                                                      SHA1:7D80B8746816ECF4AF45166AED24C731B60CCFC6
                                                                                      SHA-256:BE85C86FBD7D396D2307E7DCC945214977829E1314D1D71EFAE509E98AC15CF7
                                                                                      SHA-512:C476022D2CC840793BF7B5841051F707A30CCAB1022E30FB1E45B420077417F517BEDA5564EFB154283C7C018A9CA09D10845C6A1BFE2A2DE7C939E307BDCE6F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Knox)]} {. LoadTimeZoneFile America/Indiana/Knox.}.set TZData(:America/Knox_IN) $TZData(:America/Indiana/Knox).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):187
                                                                                      Entropy (8bit):4.810917109656368
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx09CvjHVAIg209CvjvQ2IAcGE1QOa0IAcGE9Cvju:SlSWB9IZaM3y79CzVAIgp9CE2901Qv0k
                                                                                      MD5:4763D6524D2D8FC62720BCD020469FF6
                                                                                      SHA1:EE567965467E4F3BDFE4094604E526A49305FDD8
                                                                                      SHA-256:A794B43E498484FFD83702CFB9250932058C01627F6F6F4EE1432C80A9B37CD6
                                                                                      SHA-512:37462E0A3C24D5BAEBDD1ADCF8EE94EA07682960D710D57D5FD05AF9C5F09FF30312528D79516A16A0A84A2D351019DBB33308FC39EC468033B18FB0AC872C13
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Curacao)]} {. LoadTimeZoneFile America/Curacao.}.set TZData(:America/Kralendijk) $TZData(:America/Curacao).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):210
                                                                                      Entropy (8bit):4.853705210019575
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52IAcGEyUMWkXGm2OHpJvvvX+nFp1vZSsXxyFYMUmBXlVvG9:SlSWB9X5290Xm2OHphvPKZpyFMmBVVO9
                                                                                      MD5:FE113AA98220A177DA9DD5BF588EB317
                                                                                      SHA1:083F2C36FF97185E2078B389F6DB2B3B04E95672
                                                                                      SHA-256:AF2A931C2CC39EED49710B9AFDBB3E56F1E4A1A5B9B1C813565BE43D6668493A
                                                                                      SHA-512:B6A34966F4150E3E3785563DFEB543726868923DB3980F693B4F2504B773A6CFD4102225C24897C81F1B3D22F35D1BE92D5ECE19F03028AC485A6B975896BB8F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/La_Paz) {. {-9223372036854775808 -16356 0 LMT}. {-2524505244 -16356 0 CMT}. {-1205954844 -12756 1 BST}. {-1192307244 -14400 0 -04}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):444
                                                                                      Entropy (8bit):4.171707948838632
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp5290BbmdH4VPvut/O9F/O9BQXR/uFEC3/O9Ge/uFAs/O92/O9PF/O9R8/O9Tu:cQye8mV6FC4R/u1Cp/u2sC2CdC6CTSPV
                                                                                      MD5:D20722EC3E24AA65C23DB94006246684
                                                                                      SHA1:3E9D446FFA6163ED658D947BB582C9F566374777
                                                                                      SHA-256:593FEBC924D0DE7DA5FC482952282F1B1E3432D7509798F475B13743047286DA
                                                                                      SHA-512:326E300C837981DEFC497B5E467EA70DC2F6F10765FAB39977A2F03F3BEF0A0917EFD0524E2B66CBCFE0EE424273594437E098C6503EFC73002673678016C605
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Lima) {. {-9223372036854775808 -18492 0 LMT}. {-2524503108 -18516 0 LMT}. {-1938538284 -14400 0 -05}. {-1002052800 -18000 0 -05}. {-986756400 -14400 1 -05}. {-971035200 -18000 0 -05}. {-955306800 -14400 1 -05}. {-939585600 -18000 0 -05}. {512712000 -18000 0 -05}. {544248000 -18000 0 -05}. {638942400 -18000 0 -05}. {765172800 -18000 0 -05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9409
                                                                                      Entropy (8bit):3.767062784666229
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:lBY5PBFx/9jgNf+aNwj/lpmlOxnKcndIG:lBY5PBFx/9wfefnK6
                                                                                      MD5:A661407CC08E68459018A636C8EF0EC1
                                                                                      SHA1:5524A613B07C4B4CA7404504EAD917E5B0A00112
                                                                                      SHA-256:C39E5A4C1482B13E862B4D36F4F4590BDF230BE44BAC30BDAB015CDBE02BE9C9
                                                                                      SHA-512:F5BD08D99E0B54911AC3ABFD413A1D98A0EB7F39A41E348E17D38EA9226A9320BA0CFE9CEB0954D158AB9B8761F0A9ECFB6F82DF033CD9B2234BC71A2D163B3A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Los_Angeles) {. {-9223372036854775808 -28378 0 LMT}. {-2717640000 -28800 0 PST}. {-1633269600 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-1601820000 -25200 1 PDT}. {-1583679600 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-687967140 -25200 1 PDT}. {-662655600 -28800 0 PST}. {-620838000 -25200 1 PDT}. {-608137200 -28800 0 PST}. {-589388400 -25200 1 PDT}. {-576082800 -28800 0 PST}. {-557938800 -25200 1 PDT}. {-544633200 -28800 0 PST}. {-526489200 -25200 1 PDT}. {-513183600 -28800 0 PST}. {-495039600 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463590000 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431535600 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400086000 -25200 1 PDT}. {-386780400 -28800 0 PST}. {-368636400 -25200 1 PDT}. {-355330800 -28800 0 PST}. {
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):223
                                                                                      Entropy (8bit):4.866250035215905
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y71PiKp4ozFVAIgp1PiKp4zL290hp4901PiKp4/:MBaIMYPyJpPyzL290P490Py/
                                                                                      MD5:3BAD2D8B6F2ECB3EC0BFA16DEAEBADC3
                                                                                      SHA1:2E8D7A5A29733F94FF247E7E62A7D99D5073AFDC
                                                                                      SHA-256:242870CE8998D1B4E756FB4CD7097FF1B41DF8AA6645E0B0F8EB64AEDC46C13C
                                                                                      SHA-512:533A6A22A11C34BCE3772BD85B6A5819CCCD98BF7ECED9E751191E5D1AD3B84F34D70F30936CFE501C2FA3F6AAC7ABB9F8843B7EB742C6F9C2AD4C22D5C73740
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Kentucky/Louisville)]} {. LoadTimeZoneFile America/Kentucky/Louisville.}.set TZData(:America/Louisville) $TZData(:America/Kentucky/Louisville).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):190
                                                                                      Entropy (8bit):4.81236985301262
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx09CvjHVAIg209CvjvQ2IAcGEyOqdVM1h4IAcGE9Cva:SlSWB9IZaM3y79CzVAIgp9CE290h48hf
                                                                                      MD5:EBB062CC0AA5C21F7C4278B79B9EAE6C
                                                                                      SHA1:6DFC8303BBE1FB990D7CB258E7DBC6270A5CFE64
                                                                                      SHA-256:4842420076033349DD9560879505326FFAB91BED75D6C133143FFBBFB8725975
                                                                                      SHA-512:5087C6257CA797317D049424324F5DC31BBD938436DCEB4CF4FE3D2520F7745F1C023E3EC48689957E389900EF2AACB3F5E9E49FD154DF51FF89F9A7173818CD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Curacao)]} {. LoadTimeZoneFile America/Curacao.}.set TZData(:America/Lower_Princes) $TZData(:America/Curacao).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1487
                                                                                      Entropy (8bit):3.655866753080831
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQGEecc4h1u80V2dBUGphmC17ewGtN3rvIh0VKngBHZDIOXqWoN:5K4h19U2dBUGrmO7XGtN3kh0VKngBHZy
                                                                                      MD5:3BC7560FE4E357A36D53F6DCC1E6F176
                                                                                      SHA1:F9F647E5021344A3A350CD895A26B049331E7CF1
                                                                                      SHA-256:184EC961CA5D1233A96A030D75D0D47A4111717B793EE25C82C0540E25168BDD
                                                                                      SHA-512:0805146230F55E12D7524F3F4EDB53D9C6C41C6926FA0603B3958AA82E85C9531D8CBDF4DFF085189908F293A2B29FDFA1BAEFB0FDADF34134D6C4D2FCF19397
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Maceio) {. {-9223372036854775808 -8572 0 LMT}. {-1767217028 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}. {60
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):590
                                                                                      Entropy (8bit):4.233264210289004
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp5290znTsmdHOYPprva6/wLAyM/uFn/V8/uFn/3Y/oA2P/RASx/uFn/G/uFn/M:cQGnoeOshRIpMSn/V8Sn/3YVgJvxSn/6
                                                                                      MD5:6BF9AB156020E7AC62F93F561B314CB8
                                                                                      SHA1:7484A57EADCFD870490395BB4D6865A2E024B791
                                                                                      SHA-256:D45B4690B43C46A7CD8001F8AE950CD6C0FF7B01CD5B3623E3DD92C62FD5E473
                                                                                      SHA-512:CF02E62650679D8E2D58D0D70DE2322CAAA6508AF4FF7A60E415AA8AA3A9D26D1A191CFAE986ACAF0AEF1DFC4C2E34F9A5B6EDC2018E0B7E9000917D429FB587
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Managua) {. {-9223372036854775808 -20708 0 LMT}. {-2524500892 -20712 0 MMT}. {-1121105688 -21600 0 CST}. {105084000 -18000 0 EST}. {161758800 -21600 0 CST}. {290584800 -18000 1 CDT}. {299134800 -21600 0 CST}. {322034400 -18000 1 CDT}. {330584400 -21600 0 CST}. {694260000 -18000 0 EST}. {717310800 -21600 0 CST}. {725868000 -18000 0 EST}. {852094800 -21600 0 CST}. {1113112800 -18000 1 CDT}. {1128229200 -21600 0 CST}. {1146384000 -18000 1 CDT}. {1159682400 -21600 0 CST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1127
                                                                                      Entropy (8bit):3.6965365214193797
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQGnveI8Sos/USws/QSI/LHSD/vOSy/WS3o/aS2/vSh/TSSX/WcSp/ySZd/YlSjc:5rSaSwXS4SqSbS3JSySxSxcSESAlSQSk
                                                                                      MD5:BFCC0D7639AE2D973CDBD504E99A58B8
                                                                                      SHA1:E8C43C5B026891D3E9B291446ABC050E7A100C71
                                                                                      SHA-256:1237FF765AA4C5530E5250F928DFAB5BB687C72C990A37B87E9DB8135C5D9CBD
                                                                                      SHA-512:DAD87E612161A136606E50944C50401AFD4C11D51A016704BDD070E52ED3BAC56E0E7BCFD83E7DA392FC8D2278E5F9EF6C0C466372F58AFA1005C4156CDA189D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Manaus) {. {-9223372036854775808 -14404 0 LMT}. {-1767211196 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {590036400 -1440
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):202
                                                                                      Entropy (8bit):4.890561068654966
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290zzJ/90e/:MBaIMY9QpI290zzN90O
                                                                                      MD5:3340CD9706ECBB2C6BCB16F1D75C5428
                                                                                      SHA1:FE230B53F0DCCE15C14C91F43796E46DA5C1A2CE
                                                                                      SHA-256:BC2F908758F074D593C033F7B1C7D7B4F81618A4ED46E7907CD434E0CCFEE9F4
                                                                                      SHA-512:016AB54B9E99600A296D99A036A555BB79E3C5FDB0F1BEB516AFFE17B7763D864CB076B9C2D95547ED44BA2F6FC372CDFF25708C5423E1CF643AB6F0AA78E0E3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Marigot) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):242
                                                                                      Entropy (8bit):4.7982301339896285
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5290zlJm2OHfueP9dMQR5OfT/VVFUFkCFeR/r:MBp5290znmdHfnP9dMQR5Gb/uFkCFO/r
                                                                                      MD5:2F7A1415403071E5D2E545C1DAA96A15
                                                                                      SHA1:6A8FB2ABAD2B2D25AF569624C6C9AAE9821EF70B
                                                                                      SHA-256:40F3C68A518F294062AC3DD5361BB9884308E1C490EF11D2CFDC93CB219C3D26
                                                                                      SHA-512:3E4D94AB6A46E6C3BB97304F3A5596A06041C0E0935CC840F4A6EB56D0892778F853959A742C5B832CD8F07AB9B74539C45599F22C080577503B2E34B6CE28C5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Martinique) {. {-9223372036854775808 -14660 0 LMT}. {-2524506940 -14660 0 FFMT}. {-1851537340 -14400 0 AST}. {323841600 -10800 1 ADT}. {338958000 -14400 0 AST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6526
                                                                                      Entropy (8bit):3.7582526108760064
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:t+vN41+z6stuNEsRZLbXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3LtVBaANIsr2:taN41+z6stuNEsRZLbXwDTIRqfh57TlE
                                                                                      MD5:2BBAA150389EAAE284D905A159A61167
                                                                                      SHA1:0001B50C25FC0CDF015A60150963AAF895EEDEEF
                                                                                      SHA-256:A7966B95DBE643291FB68E228B60E2DC780F8155E064D96B670C8290F104E4AB
                                                                                      SHA-512:87CE18E7E4C2C59A953CD47005EF406F4923730459996B1BF09B04FFD9CD5F963A9E50299ECCDBF4B24C565412B706B1ABC39890D659E6F409F1BA50308E57F9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Matamoros) {. {-9223372036854775808 -24000 0 LMT}. {-1514743200 -21600 0 CST}. {568015200 -21600 0 CST}. {576057600 -18000 1 CDT}. {594198000 -21600 0 CST}. {599637600 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {891763200 -18000 1 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001833200 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000 -18000 1 CDT}. {1067151600 -21600 0 CST}. {1081065600 -18000 1 CDT}. {1099206000 -21600 0 CST}. {1112515200 -18000 1 CDT}. {1130655600 -21600 0 CST}. {1143964800 -18000 1 CDT}. {1162105200 -21600 0 CST}. {1175414400 -18000 1 CDT}. {1193554800 -21600 0 CST}. {1207468800 -18000 1 C
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6619
                                                                                      Entropy (8bit):3.788952004807415
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:W7ezBT8tRkfKxhzY720zaOXmlITHjLc1cb:X8tRkfKv+2wB9h
                                                                                      MD5:4D63766E65BF3E772CCEC2D6DB3E2D3E
                                                                                      SHA1:DB541D2908159C7EF98F912D8DBC36755FFD13F3
                                                                                      SHA-256:81CEA4A397AF6190FD250325CF513976B3508209AE3A88FDFD55490A5016A36D
                                                                                      SHA-512:DFAF1B3547B1B1B78B33F1F0F5E9624C693492687EC5D060FC4C6CBE2AFBB61B2E9B618133636DD62364D28B2450F741561AADFDE7B811F579BBC7247343A041
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Mazatlan) {. {-9223372036854775808 -25540 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {-873828000 -25200 0 MST}. {-661539600 -28800 0 PST}. {28800 -25200 0 MST}. {828867600 -21600 1 MDT}. {846403200 -25200 0 MST}. {860317200 -21600 1 MDT}. {877852800 -25200 0 MST}. {891766800 -21600 1 MDT}. {909302400 -25200 0 MST}. {923216400 -21600 1 MDT}. {941356800 -25200 0 MST}. {954666000 -21600 1 MDT}. {972806400 -25200 0 MST}. {989139600 -21600 1 MDT}. {1001836800 -25200 0 MST}. {1018170000 -21600 1 MDT}. {1035705600 -25200 0 MST}. {1049619600 -21600 1 MDT}. {1067155200 -25200 0 MST}. {1081069200 -21600 1 MDT}. {1099209600 -25200 0 MST}. {1112518800 -21600 1 MDT}. {1130659200 -25200 0 MST}. {1143968400 -21600
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):214
                                                                                      Entropy (8bit):4.76389929825594
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7/MBVAIgp/Ma290zpH+90/MI:MBaIMY/Mcp/Ma290zpe90/MI
                                                                                      MD5:A6EFD8F443D4CB54A5FB238D4D975808
                                                                                      SHA1:8F25C6C0EA9D73DC8D1964C4A28A4E2E783880CC
                                                                                      SHA-256:39B34B406339F06A8D187F8CCC1B6BF2550E49329F7DCE223619190F560E75F8
                                                                                      SHA-512:4B5D48472D56AF19B29AD2377573CC8CB3ED9EF1AF53C00C907B6576FA852EA3D1E9F9B3A78A280DC44F8ADBE5B81D6AEC2609BE08FFA08507CD0F4139878F46
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Mendoza)]} {. LoadTimeZoneFile America/Argentina/Mendoza.}.set TZData(:America/Mendoza) $TZData(:America/Argentina/Mendoza).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8136
                                                                                      Entropy (8bit):3.7460641906933345
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:oXxj07ffkeTzZSJw5/9/yuvQ+hcrD57X0N41+IestuNEbYkzbXwDTIRqfhXbdXvC:oXxj07ffNTzZSJw5/9/yuvQ6crD57X0w
                                                                                      MD5:0D0DC4A816CDAE4707CDF4DF51A18D30
                                                                                      SHA1:7ED2835AA8F723B958A6631092019A779554CADE
                                                                                      SHA-256:3C659C1EAC7848BBE8DF00F857F8F81D2F64B56BD1CEF3495641C53C007434FA
                                                                                      SHA-512:930F2FDC2C1EAE4106F9B37A16BCBBAF618A2CCBBA98C712E8215555CF09B9303D71842DEC38EFAF930DB71E14E8208B14E41E10B54EF98335E01435D0FC3518
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Menominee) {. {-9223372036854775808 -21027 0 LMT}. {-2659759773 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-757360800 -21600 0 CST}. {-747244800 -18000 1 CDT}. {-733942800 -21600 0 CST}. {-116438400 -18000 1 CDT}. {-100112400 -21600 0 CST}. {-21484800 -18000 0 EST}. {104914800 -21600 0 CST}. {104918400 -18000 1 CDT}. {120639600 -21600 0 CST}. {126691200 -18000 1 CDT}. {152089200 -21600 0 CST}. {162374400 -18000 1 CDT}. {183538800 -21600 0 CST}. {199267200 -18000 1 CDT}. {215593200 -21600 0 CST}. {230716800 -18000 1 CDT}. {247042800 -21600 0 CST}. {262771200 -18000 1 CDT}. {278492400 -21600 0 CST}. {294220800 -18000 1 CDT}. {309942000 -21600 0 CST}. {325670400 -18000 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6435
                                                                                      Entropy (8bit):3.757504464563519
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:gN41+z6stuNEsRZjWqZL/1dCYDXEaXTuXMEXiH4RxGIJkYWXsWwav7jNf4sOVEmR:gN41+z6stuNEsRZjWqZL/1dCYDDCxyHo
                                                                                      MD5:A7C5CFE3FA08D4CEDF6324457EA5766E
                                                                                      SHA1:83BB96398C0B1B34771940C8F7A19CB78C5EF72F
                                                                                      SHA-256:A1D7DE7285DC78ADDE1B0A04E05DA44D0D46D4696F67A682D0D28313A53825FE
                                                                                      SHA-512:092DD7CEF6A5861472965E082171937EEDCFB3AE1821E3C88AA1BDFAB1EC48F765CAC497E3E5C78C19653C78B087C7CE28A8AB76F9073558963234901EF4B4A4
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Merida) {. {-9223372036854775808 -21508 0 LMT}. {-1514743200 -21600 0 CST}. {377935200 -18000 0 EST}. {407653200 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {891763200 -18000 1 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001833200 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000 -18000 1 CDT}. {1067151600 -21600 0 CST}. {1081065600 -18000 1 CDT}. {1099206000 -21600 0 CST}. {1112515200 -18000 1 CDT}. {1130655600 -21600 0 CST}. {1143964800 -18000 1 CDT}. {1162105200 -21600 0 CST}. {1175414400 -18000 1 CDT}. {1193554800 -21600 0 CST}. {1207468800 -18000 1 CDT}. {1225004400 -21600 0 CST}. {1238918400 -18000 1 CD
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6462
                                                                                      Entropy (8bit):3.906655458013535
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:XP19jJ+h5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:X99jIh5sBPy+CMt/ElALLVuAH
                                                                                      MD5:897140EE4C46A300FBA4B66692A77D2B
                                                                                      SHA1:D5F2F3C8561A19EA0C5DAF0236696D5DB98D4220
                                                                                      SHA-256:8B48C28A0AB6728CEDBCC82197355A5F9DD7D73E270EE949D996BB788777623B
                                                                                      SHA-512:17E52B3C00C4EDE3B2FA10A4BE0601889B12581D31936D075E85118F37329716C4083D2B16F7081F7AA73EC9774ED7B4CF67615BE6090F8A506BF77AADE0CAFD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Metlakatla) {. {-9223372036854775808 54822 0 LMT}. {-3225223727 -31578 0 LMT}. {-2188955622 -28800 0 PST}. {-883584000 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-31507200 -28800 0 PST}. {-21477600 -25200 1 PDT}. {-5756400 -28800 0 PST}. {9972000 -25200 1 PDT}. {25693200 -28800 0 PST}. {41421600 -25200 1 PDT}. {57747600 -28800 0 PST}. {73476000 -25200 1 PDT}. {89197200 -28800 0 PST}. {104925600 -25200 1 PDT}. {120646800 -28800 0 PST}. {126698400 -25200 1 PDT}. {152096400 -28800 0 PST}. {162381600 -25200 1 PDT}. {183546000 -28800 0 PST}. {199274400 -25200 1 PDT}. {215600400 -28800 0 PST}. {230724000 -25200 1 PDT}. {247050000 -28800 0 PST}. {262778400 -25200 1 PDT}. {278499600 -28800 0 PST}. {294228000 -25200 1 PDT}. {309949200 -28800 0 PST}. {325677
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6807
                                                                                      Entropy (8bit):3.761365047166545
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:VeE7nN41+zKstuNEsRZjWqZL/1dCYDXEaXTuXMEXiH4RxGIJkYWXsWwav7jNf4sQ:VeE7nN41+zKstuNEsRZjWqZL/1dCYDDK
                                                                                      MD5:C675DA8A44A9841C417C585C2661EF13
                                                                                      SHA1:147DDE5DD00E520DA889AC9931088E6232CE6FEA
                                                                                      SHA-256:82B9AAD03408A9DFC0B6361EC923FEAEF97DBB4B3129B772B902B9DAE345D63E
                                                                                      SHA-512:00615A5EC0D08BABF009C3CAAF3D631B1F4E2E4324E91B0F29ADD7E61B51C80D5D495D20BD131A9370C3005B2E510C8A4E4869A5032D82BC33C875E909CDE086
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Mexico_City) {. {-9223372036854775808 -23796 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {-975261600 -18000 1 CDT}. {-963169200 -21600 0 CST}. {-917114400 -18000 1 CDT}. {-907354800 -21600 0 CST}. {-821901600 -18000 1 CWT}. {-810068400 -21600 0 CST}. {-627501600 -18000 1 CDT}. {-612990000 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {891763200 -18000 1 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001836800 -21600 0 CST}. {1014184800 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6846
                                                                                      Entropy (8bit):3.44227328239419
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:FxfUaXYEn/wGm3eADKja4PcCYCJ7j7Ub0ZixJpF8pnmpRipo1kay2DfhJ+Nwz/ad:DeTntbDs
                                                                                      MD5:0C7122725D98CDE5CB9B22624D24A26C
                                                                                      SHA1:1889279EBE1377DB3460B706CAA4ECF803651517
                                                                                      SHA-256:86BB088047FB5A6041C7B0792D15F9CB453F49A54F78529CC415B7FF2C41265A
                                                                                      SHA-512:C23D3AE8D579FAC56521A0C06178550C4976E906A4CD149554821A2550B0EAB43344C6536166271EAA22EC77AF8529D9164696D7A5A740B02FA34C4272D43F26
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Miquelon) {. {-9223372036854775808 -13480 0 LMT}. {-1850328920 -14400 0 AST}. {326001600 -10800 0 -03}. {536468400 -10800 0 -02}. {544597200 -7200 1 -02}. {562132800 -10800 0 -02}. {576046800 -7200 1 -02}. {594187200 -10800 0 -02}. {607496400 -7200 1 -02}. {625636800 -10800 0 -02}. {638946000 -7200 1 -02}. {657086400 -10800 0 -02}. {671000400 -7200 1 -02}. {688536000 -10800 0 -02}. {702450000 -7200 1 -02}. {719985600 -10800 0 -02}. {733899600 -7200 1 -02}. {752040000 -10800 0 -02}. {765349200 -7200 1 -02}. {783489600 -10800 0 -02}. {796798800 -7200 1 -02}. {814939200 -10800 0 -02}. {828853200 -7200 1 -02}. {846388800 -10800 0 -02}. {860302800 -7200 1 -02}. {877838400 -10800 0 -02}. {891752400 -7200 1 -02}. {909288000 -10800 0 -02}. {923202000 -7200 1 -02}. {941342400 -10800 0 -02}. {954651600 -7200 1 -02}. {972792000 -10800 0 -
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):10165
                                                                                      Entropy (8bit):3.73501024949866
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:XYtQYUKXZRMavqQS8L2En/RDmzTWRf2oFnoF8l988fL8vG+81VcfnrpbX+qvlrPf:gQYzCO4alKqYvuOdeYP/Jv
                                                                                      MD5:C1F34BD1FB4402481FFA5ABEE1573085
                                                                                      SHA1:46B9AD38086417554549C36A40487140256BED57
                                                                                      SHA-256:A4C2F586D7F59A192D6D326AD892C8BE20753FB4D315D506F4C2ED9E3F657B9A
                                                                                      SHA-512:115D3E65A6A3834E748ED1917CF03A835F74EC0F8DB789C2B99EB78879EA3A5A2AFEB35981BA221D868E6A5B579374CFB3F865ACF6D4271B918EBCC2C3C69579
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Moncton) {. {-9223372036854775808 -15548 0 LMT}. {-2715882052 -18000 0 EST}. {-2131642800 -14400 0 AST}. {-1632074400 -10800 1 ADT}. {-1615143600 -14400 0 AST}. {-1167595200 -14400 0 AST}. {-1153681200 -10800 1 ADT}. {-1145822400 -14400 0 AST}. {-1122231600 -10800 1 ADT}. {-1114372800 -14400 0 AST}. {-1090782000 -10800 1 ADT}. {-1082923200 -14400 0 AST}. {-1059332400 -10800 1 ADT}. {-1051473600 -14400 0 AST}. {-1027882800 -10800 1 ADT}. {-1020024000 -14400 0 AST}. {-996433200 -10800 1 ADT}. {-988574400 -14400 0 AST}. {-965674800 -10800 1 ADT}. {-955396800 -14400 0 AST}. {-934743600 -10800 1 ADT}. {-923947200 -14400 0 AST}. {-904503600 -10800 1 ADT}. {-891892800 -14400 0 AST}. {-883598400 -14400 0 AST}. {-880221600 -10800 1 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {-757368000 -14400 0 AST}. {-747252000 -10800 1 ADT}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6496
                                                                                      Entropy (8bit):3.75909042772931
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Xc+vN41+z6stuNEsRZjWqZL/1dCYDXEaXTuXMEXiH4RxGIJkYWXsWwav7jNf4sOt:saN41+z6stuNEsRZjWqZL/1dCYDDCxyI
                                                                                      MD5:255A5A8E27CA1F0127D71E09033C6D9B
                                                                                      SHA1:4F1C5E6D3F9E5BC9F8958FA50C195FDADD0F4022
                                                                                      SHA-256:C753DEF7056E26D882DCD842729816890D42B6C7E31522111467C0C39A24B2F2
                                                                                      SHA-512:96A67C3CC54EC39086D4DF681DDA39B4167FE80F0C45600045480F28C282071915F793BD672146119A22E0C15339F162DFF9DF326E7132E723684EF079666F58
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Monterrey) {. {-9223372036854775808 -24076 0 LMT}. {-1514743200 -21600 0 CST}. {568015200 -21600 0 CST}. {576057600 -18000 1 CDT}. {594198000 -21600 0 CST}. {599637600 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {891763200 -18000 1 CDT}. {909298800 -21600 0 CST}. {923212800 -18000 1 CDT}. {941353200 -21600 0 CST}. {954662400 -18000 1 CDT}. {972802800 -21600 0 CST}. {989136000 -18000 1 CDT}. {1001833200 -21600 0 CST}. {1018166400 -18000 1 CDT}. {1035702000 -21600 0 CST}. {1049616000 -18000 1 CDT}. {1067151600 -21600 0 CST}. {1081065600 -18000 1 CDT}. {1099206000 -21600 0 CST}. {1112515200 -18000 1 CDT}. {1130655600 -21600 0 CST}. {1143964800 -18000 1 CDT}. {1162105200 -21600 0 CST}. {1175414400 -18000 1 CDT}. {1193554800 -21600 0 CST}. {1207468800 -18000 1 C
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2840
                                                                                      Entropy (8bit):3.549378422404712
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5JJjQSSSGEcS2SrPZSMSEkS/StSneSOSnx7EXnF9XXGGLgvA/Sa8h1liqZovoJqP:X9QV0cduTSe+J1ix7inFBXGGUvA/Sa8A
                                                                                      MD5:87A9F18CE5E5EE97D943316EE93DC664
                                                                                      SHA1:C221C82FA644943AF05C5737B4A68418BEFE66D7
                                                                                      SHA-256:E8DB201FDAF1FD43BE39422062CEB2A25F25764934C481A95CD7BB3F93949495
                                                                                      SHA-512:AC7D6BA85A37585BEC2101AAF0F46B04BF49F56B449A2BEC4E32D009576CA4D0CB687981EFA96DA8DAB00453F0020925E5FB9681BF8071AC6EFFC4F938E0D891
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Montevideo) {. {-9223372036854775808 -13491 0 LMT}. {-1942690509 -13491 0 MMT}. {-1567455309 -14400 0 -04}. {-1459627200 -10800 0 -0330}. {-1443819600 -12600 0 -0330}. {-1428006600 -10800 1 -0330}. {-1412283600 -12600 0 -0330}. {-1396470600 -10800 1 -0330}. {-1380747600 -12600 0 -0330}. {-1141590600 -10800 1 -0330}. {-1128286800 -12600 0 -0330}. {-1110141000 -10800 1 -0330}. {-1096837200 -12600 0 -0330}. {-1078691400 -10800 1 -0330}. {-1065387600 -12600 0 -0330}. {-1047241800 -10800 1 -0330}. {-1033938000 -12600 0 -0330}. {-1015187400 -10800 1 -0330}. {-1002488400 -12600 0 -0330}. {-983737800 -10800 1 -0330}. {-971038800 -12600 0 -0330}. {-954707400 -10800 1 -0330}. {-938984400 -12600 0 -0330}. {-920838600 -10800 1 -0330}. {-907534800 -12600 0 -0330}. {-896819400 -10800 1 -0330}. {-853621200 -9000 0 -03}. {-845847000 -10800 0 -03}. {-33
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.696915330047381
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qMKLRXIVAIg20qMKLRI62IAcGEzQ21h4IAcGEqMKR:SlSWB9IZaM3y7RQ+VAIgpRQ+6290zQg2
                                                                                      MD5:F4631583229AD8B12C548E624AAF4A9F
                                                                                      SHA1:C56022CEACBD910C9CBF8C39C974021294AEE9DA
                                                                                      SHA-256:884575BE85D1276A1AE3426F33153B3D4787AC5238FDBE0991C6608E7EB0DF07
                                                                                      SHA-512:48FB9910D8A75AD9451C860716746D38B29319CA04DF9E8690D62FB875A5BEBCC7A8C546A60878821BD68A83271C69671D483C3133E4F807F2C3AC899CEBF065
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Toronto)]} {. LoadTimeZoneFile America/Toronto.}.set TZData(:America/Montreal) $TZData(:America/Toronto).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):205
                                                                                      Entropy (8bit):4.865859395466201
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290zQ1HK90e/:MBaIMY9QpI290zQ490O
                                                                                      MD5:705E51A8FB38AA8F9714256AFB55DA8A
                                                                                      SHA1:97D96BE4C08F128E739D541A43057F08D24DDDCF
                                                                                      SHA-256:0FED15D7D58E8A732110FF6765D0D148D15ACBB0251EE867CE7596933E999865
                                                                                      SHA-512:4D7E42ECDB16F7A8A62D9EDA1E365325F3CBFAA1EF0E9FEE2790E24BA8DEAAA716D41F9389B849C69DC3973DA61D575146932FB2C8AC81579C65C18E45AE386E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Montserrat) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8260
                                                                                      Entropy (8bit):3.7353311910027376
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:JUzoaC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:Gzorn+qvOTFhPI1jFIL
                                                                                      MD5:6F9F530A792FC34E2B0CEE4BC3DB3809
                                                                                      SHA1:4DF8A4A6993E47DD5A710BEE921D88FEF44858E7
                                                                                      SHA-256:9F62117DDA0A21D37B63C9083B3C50572399B22D640262F427D68123078B32F9
                                                                                      SHA-512:C2BF93FDBE8430113FA63561D1A08145DCF31CD679AB7230098993C7A19EF0F29F486C962656F8A62505CB1BFE993FBD3BB5FB0BAE7B6E7E190DE2865C445408
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Nassau) {. {-9223372036854775808 -18570 0 LMT}. {-1825095030 -18000 0 EST}. {-179341200 -14400 1 EDT}. {-163620000 -18000 0 EST}. {-147891600 -14400 1 EDT}. {-131565600 -18000 0 EST}. {-116442000 -14400 1 EDT}. {-100116000 -18000 0 EST}. {-84387600 -14400 1 EDT}. {-68666400 -18000 0 EST}. {-52938000 -14400 1 EDT}. {-37216800 -18000 0 EST}. {-21488400 -14400 1 EDT}. {-5767200 -18000 0 EST}. {9961200 -14400 1 EDT}. {25682400 -18000 0 EST}. {41410800 -14400 1 EDT}. {57736800 -18000 0 EST}. {73465200 -14400 1 EDT}. {89186400 -18000 0 EST}. {104914800 -14400 1 EDT}. {120636000 -18000 0 EST}. {136364400 -14400 1 EDT}. {152085600 -18000 0 EST}. {167814000 -14400 1 EDT}. {183535200 -18000 0 EST}. {189320400 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):11004
                                                                                      Entropy (8bit):3.725417189649631
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:iNXYUiZrbgZ8UMr5UwdaC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:23iZrbgZ8UMr2wdrn+qvOTFhPI1jFIL
                                                                                      MD5:C9D78AB6CF796A9D504BE2903F00B49C
                                                                                      SHA1:A6C0E4135986A1A6F36B62276BFAB396DA1A4A9B
                                                                                      SHA-256:1AB6E47D96BC34F57D56B936233F58B5C748B65E06AFF6449C3E3C317E411EFE
                                                                                      SHA-512:6D20B13F337734CB58198396477B7C0E9CB89ED4D7AB328C22A4A528CAF187D10F42540DBB4514A0C139E6F4AE9A1A71AED02E3735D1D4F12C5314014C0C1EB6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/New_York) {. {-9223372036854775808 -17762 0 LMT}. {-2717650800 -18000 0 EST}. {-1633280400 -14400 1 EDT}. {-1615140000 -18000 0 EST}. {-1601830800 -14400 1 EDT}. {-1583690400 -18000 0 EST}. {-1577905200 -18000 0 EST}. {-1570381200 -14400 1 EDT}. {-1551636000 -18000 0 EST}. {-1536512400 -14400 1 EDT}. {-1523210400 -18000 0 EST}. {-1504458000 -14400 1 EDT}. {-1491760800 -18000 0 EST}. {-1473008400 -14400 1 EDT}. {-1459706400 -18000 0 EST}. {-1441558800 -14400 1 EDT}. {-1428256800 -18000 0 EST}. {-1410109200 -14400 1 EDT}. {-1396807200 -18000 0 EST}. {-1378659600 -14400 1 EDT}. {-1365357600 -18000 0 EST}. {-1347210000 -14400 1 EDT}. {-1333908000 -18000 0 EST}. {-1315155600 -14400 1 EDT}. {-1301853600 -18000 0 EST}. {-1283706000 -14400 1 EDT}. {-1270404000 -18000 0 EST}. {-1252256400 -14400 1 EDT}. {-1238954400 -18000 0 EST}. {-122080680
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7836
                                                                                      Entropy (8bit):3.7462966187089535
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:rEa2raC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:rYrrn+qvOTFhPI1jFIL
                                                                                      MD5:3D389AA51D3E29E8A1E8ED07646AA0DD
                                                                                      SHA1:2E3DF9406B14662ADEDDC0F891CD81DF23D98157
                                                                                      SHA-256:3A0FB897E5CCB31B139E009B909053DCE36BB5791ACF23529D874AFA9F0BB405
                                                                                      SHA-512:AFF7B30355ECB6EBD43D1E6C943C250AB98CC82BDC8DDC7595769E4CE188A23591AEFCF18A028CC6479CF6AA20F65980E37C74F6CEE907537366136FAF29B66E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Nipigon) {. {-9223372036854775808 -21184 0 LMT}. {-2366734016 -18000 0 EST}. {-1632070800 -14400 1 EDT}. {-1615140000 -18000 0 EST}. {-923252400 -14400 1 EDT}. {-880218000 -14400 0 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {136364400 -14400 1 EDT}. {152085600 -18000 0 EST}. {167814000 -14400 1 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600 -18000 0 EST}. {388566000 -14400 1 EDT}. {404892000 -18000 0 EST}. {420015600 -14400 1 EDT}. {436341600 -18000 0 EST}. {452070000 -14400 1 EDT}. {467791200 -18000 0 EST}. {483519600 -14400 1 EDT}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8404
                                                                                      Entropy (8bit):3.88589736733708
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:OWmWQm825s/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:OWmWQmI/4h5sBPy+CMt/ElALLVuAH
                                                                                      MD5:F5E89780553D3D30A32CF65746CA9A69
                                                                                      SHA1:43D8B6E3C5D719599A680E1E6D4FF913D2700D7E
                                                                                      SHA-256:5BDA4867EC7707E9D5E07AD3E558DA7C1E44EC1135E85A8F1809441A54B22BE5
                                                                                      SHA-512:D1239FF5277055DD8787BF58ED14DBDC229FC46EDDF21E034CA77DEA439631974F44FCE63EF12483520ADB83AD235642AE480230544A7284A8BDAA5296486563
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Nome) {. {-9223372036854775808 46702 0 LMT}. {-3225223727 -39698 0 LMT}. {-2188947502 -39600 0 NST}. {-883573200 -39600 0 NST}. {-880196400 -36000 1 NWT}. {-769395600 -36000 1 NPT}. {-765374400 -39600 0 NST}. {-757342800 -39600 0 NST}. {-86878800 -39600 0 BST}. {-31496400 -39600 0 BST}. {-21466800 -36000 1 BDT}. {-5745600 -39600 0 BST}. {9982800 -36000 1 BDT}. {25704000 -39600 0 BST}. {41432400 -36000 1 BDT}. {57758400 -39600 0 BST}. {73486800 -36000 1 BDT}. {89208000 -39600 0 BST}. {104936400 -36000 1 BDT}. {120657600 -39600 0 BST}. {126709200 -36000 1 BDT}. {152107200 -39600 0 BST}. {162392400 -36000 1 BDT}. {183556800 -39600 0 BST}. {199285200 -36000 1 BDT}. {215611200 -39600 0 BST}. {230734800 -36000 1 BDT}. {247060800 -39600 0 BST}. {262789200 -36000 1 BDT}. {278510400 -39600 0 BST}. {294238800 -36000 1 BDT}. {309960000 -3
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1349
                                                                                      Entropy (8bit):3.6915980783248976
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQ8eHNxrW3YrEnBrur9rTPBrJ2r+KrDv1rn1rHhr33rPxN4brSJrrh4rEgtXrH1W:5PxrW3YrEnBruxrT5rJ2r+KrDv1rn1r/
                                                                                      MD5:10B0C457561BA600E9A39CE20CD22B72
                                                                                      SHA1:07946FBB04D0C8D7CA92204E3E2DF3AB755196AB
                                                                                      SHA-256:96AEE3A529C11C8DBDE3431C65C8C2315DBCFB5686957419EFCEB3D49208AB11
                                                                                      SHA-512:A60AFB3DD064EAB9C4AE5F0A112DA5A7903BDB99DCF78BB99FE13DBB72310E8D47A2A62A58DAD2AB4F33971001F5B9787D663649E05FBD47B75994113CD5E8ED
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Noronha) {. {-9223372036854775808 -7780 0 LMT}. {-1767217820 -7200 0 -02}. {-1206961200 -3600 1 -02}. {-1191366000 -7200 0 -02}. {-1175378400 -3600 1 -02}. {-1159830000 -7200 0 -02}. {-633823200 -3600 1 -02}. {-622072800 -7200 0 -02}. {-602287200 -3600 1 -02}. {-591836400 -7200 0 -02}. {-570751200 -3600 1 -02}. {-560214000 -7200 0 -02}. {-539128800 -3600 1 -02}. {-531356400 -7200 0 -02}. {-191368800 -3600 1 -02}. {-184201200 -7200 0 -02}. {-155167200 -3600 1 -02}. {-150073200 -7200 0 -02}. {-128901600 -3600 1 -02}. {-121129200 -7200 0 -02}. {-99957600 -3600 1 -02}. {-89593200 -7200 0 -02}. {-68421600 -3600 1 -02}. {-57970800 -7200 0 -02}. {499744800 -3600 1 -02}. {511232400 -7200 0 -02}. {530589600 -3600 1 -02}. {540262800 -7200 0 -02}. {562125600 -3600 1 -02}. {571194000 -7200 0 -02}. {592970400 -3600 1 -02}. {602038800 -7200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8278
                                                                                      Entropy (8bit):3.7975723806562063
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:raF2dVtXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3LtVBaANIsrXHEK5Dac5TE35:OFcVtXwDTIRqfh57Tlto//q7u379zlqw
                                                                                      MD5:15AABAE9ABE4AF7ABEADF24A510E9583
                                                                                      SHA1:3DEF11310D02F0492DF09591A039F46A8A72D086
                                                                                      SHA-256:B328CC893D217C4FB6C84AA998009940BFBAE240F944F40E7EB900DEF1C7A5CF
                                                                                      SHA-512:7A12A25EB6D6202C47CFDD9F3CE71342406F0EDA3D1D68B842BCFE97EFF1F2E0C11AD34D4EE0A61DF7E0C7E8F400C8CCA73230BDB3C677F8D15CE5CBA44775D7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/North_Dakota/Beulah) {. {-9223372036854775808 -24427 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126694800 -21600 1 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {230720400 -21600 1 MDT}. {247046400 -25200 0 MS
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8278
                                                                                      Entropy (8bit):3.7834920003907664
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:LF2dK7X0N41+IestuNEbYkzbXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3LtVBaT:LFcK7X0N41+IestuNEbYkzbXwDTIRqfK
                                                                                      MD5:AC804124F4CE4626F5C1FDA2BC043011
                                                                                      SHA1:4B3E8CC90671BA543112CEE1AB5450C6EA4615DF
                                                                                      SHA-256:E90121F7D275FDCC7B8DCDEC5F8311194D432510FEF5F5F0D6F211A4AACB78EF
                                                                                      SHA-512:056EF65693C16CB58EC5A223528C636346DB37B75000397D03663925545979792BBC50B20B5AA20139ECE9A9D6B73DA80C2319AA4F0609D6FC1A6D30D0567C58
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/North_Dakota/Center) {. {-9223372036854775808 -24312 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126694800 -21600 1 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {230720400 -21600 1 MDT}. {247046400 -25200 0 MS
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8281
                                                                                      Entropy (8bit):3.795939700557522
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:uF2dyuNEbYkzbXwDTIRqfhXbdXvDXpVXVto//q7u379zlq3LtVBaANIsrXHEK5Da:uFcyuNEbYkzbXwDTIRqfh57Tlto//q7k
                                                                                      MD5:E26FC508DFD73B610C5543487C763FF5
                                                                                      SHA1:8FBDE67AF561037AAA2EDF93E9456C7E534F4B5A
                                                                                      SHA-256:387D3C57EDE8CCAAD0655F19B35BC0D124C016D16F06B6F2498C1151E4792778
                                                                                      SHA-512:8A10B7370D1521EDF18AB4D5192C930ABC68AB9AE718ADF3D175EACE9A1F5DAC690A76B02EFB4059374761962D8C2660497F8E951DFE9812FB3CFCFDF9165E45
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/North_Dakota/New_Salem) {. {-9223372036854775808 -24339 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126694800 -21600 1 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {230720400 -21600 1 MDT}. {247046400 -25200 0
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6621
                                                                                      Entropy (8bit):3.7945318113967823
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5gUFM/6M/Mp5tyTc8Ln4ypZ9giGuWGwZIoktiz+hL5Cw5feQ5BT5rBSNNOVQoh/5:KJNfzo+C2mWBNQMsmNTxf6AeO+cblX
                                                                                      MD5:D88A28F381C79410D816F8D2D1610A02
                                                                                      SHA1:81949A1CACD5907CA5A8649385C03813EEFCDDE0
                                                                                      SHA-256:F65C0F8532387AFE703FACDEE325BF8D7F3D1232DEE92D65426FF917DD582CB3
                                                                                      SHA-512:9A9B0C65ECDFF690EF2933B323B3A1CF2D67D0A43F285BB9FEEFF275316148A07F5AC044C48F64E3D8CFA7C1DE44AF220A6855DC01225F8BFFF63AEC946B944A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Ojinaga) {. {-9223372036854775808 -25060 0 LMT}. {-1514739600 -25200 0 MST}. {-1343066400 -21600 0 CST}. {-1234807200 -25200 0 MST}. {-1220292000 -21600 0 CST}. {-1207159200 -25200 0 MST}. {-1191344400 -21600 0 CST}. {820476000 -21600 0 CST}. {828864000 -18000 1 CDT}. {846399600 -21600 0 CST}. {860313600 -18000 1 CDT}. {877849200 -21600 0 CST}. {883634400 -21600 0 CST}. {891766800 -21600 0 MDT}. {909302400 -25200 0 MST}. {923216400 -21600 1 MDT}. {941356800 -25200 0 MST}. {954666000 -21600 1 MDT}. {972806400 -25200 0 MST}. {989139600 -21600 1 MDT}. {1001836800 -25200 0 MST}. {1018170000 -21600 1 MDT}. {1035705600 -25200 0 MST}. {1049619600 -21600 1 MDT}. {1067155200 -25200 0 MST}. {1081069200 -21600 1 MDT}. {1099209600 -25200 0 MST}. {1112518800 -21600 1 MDT}. {1130659200 -25200 0 MST}. {1143968400 -21600 1 MDT}. {1162108800 -2520
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.924365872261203
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52IAcGEu5fcXGm2OHGf8xYvX5BidhZSsc1HRX1vain:SlSWB9X5290WTm2OHDxYP5GhZE3X1iin
                                                                                      MD5:771816CABF25492752C5DA76C5EF74A5
                                                                                      SHA1:6494F467187F99C9A51AB670CD8DC35078D63904
                                                                                      SHA-256:0E323D15EA84D4B6E838D5DCD99AEE68666AF97A770DA2AF84B7BDCA4AB1DBBA
                                                                                      SHA-512:C32D918E121D800B9DFD5CE1F13A4BF2505C0EDCE0085639C8EDF48073E0888906F1A28EF375BDCF549DB14CD33F7C405E28BC35DDF22445C224FBC64146B4EC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Panama) {. {-9223372036854775808 -19088 0 LMT}. {-2524502512 -19176 0 CMT}. {-1946918424 -18000 0 EST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7484
                                                                                      Entropy (8bit):3.768929501362495
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:i2KFEUlpde9pXbO53or0gqvOTFhPI1jFIL:n0r3+
                                                                                      MD5:2701DA468F9F1C819301374E807AAA27
                                                                                      SHA1:F08D7525639EA752D52F36A6D14F14C5514CED8E
                                                                                      SHA-256:6C7DFDE581AC9DE7B4ED6A525A40F905B7550BD2AE7E55D7E2E1B81B771D030B
                                                                                      SHA-512:98BD9EDD40D2982E20A169B8B8E8D411382E5707634BB4F8365CFFF73DB17B8C042D7ED1A59B9511A3A7EB587895119532CCED69F5EFBC49D74FFDC9CA91966F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Pangnirtung) {. {-9223372036854775808 0 0 -00}. {-1546300800 -14400 0 AST}. {-880221600 -10800 1 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {-147902400 -7200 1 ADDT}. {-131572800 -14400 0 AST}. {325663200 -10800 1 ADT}. {341384400 -14400 0 AST}. {357112800 -10800 1 ADT}. {372834000 -14400 0 AST}. {388562400 -10800 1 ADT}. {404888400 -14400 0 AST}. {420012000 -10800 1 ADT}. {436338000 -14400 0 AST}. {452066400 -10800 1 ADT}. {467787600 -14400 0 AST}. {483516000 -10800 1 ADT}. {499237200 -14400 0 AST}. {514965600 -10800 1 ADT}. {530686800 -14400 0 AST}. {544600800 -10800 1 ADT}. {562136400 -14400 0 AST}. {576050400 -10800 1 ADT}. {594190800 -14400 0 AST}. {607500000 -10800 1 ADT}. {625640400 -14400 0 AST}. {638949600 -10800 1 ADT}. {657090000 -14400 0 AST}. {671004000 -10800 1 ADT}. {688539600 -14400 0 AST}. {702
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):244
                                                                                      Entropy (8bit):4.731092370398455
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5290oldJm2OHeke3FIMVTvVOzGXg/VVFAHC:MBp5290olLmdHeV3qSv4zX/OHC
                                                                                      MD5:5D11C2A86B0CDE60801190BFC8FA5E0B
                                                                                      SHA1:38A63200995E359E61F1DEA00C5716938ED7A499
                                                                                      SHA-256:D2078D8D396D5189E1D3555628960990FD63694D08256FF814EE841E01A3F56E
                                                                                      SHA-512:D4D83019E5AE05C3FCDE3518672DC08925C0DECC9FCA6927D75ADA969647CE8EF2D1C67FFD1A075969309CD1B1AADDF15DB21ABDAF241EAA450D2C9E038AEF6A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Paramaribo) {. {-9223372036854775808 -13240 0 LMT}. {-1861906760 -13252 0 PMT}. {-1104524348 -13236 0 PMT}. {-765317964 -12600 0 -0330}. {465449400 -10800 0 -03}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):479
                                                                                      Entropy (8bit):4.379302206927978
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp5290OQmdH514YPFotFg4tFQxRgmjtFdRb2:cQCeksFsFgcFQxBhF7b2
                                                                                      MD5:1B5C5CBC4168FCCC9100487D3145AF6D
                                                                                      SHA1:6E9E3074B783108032469C8E601D2C63A573B840
                                                                                      SHA-256:9E28F87C0D9EE6AD6791A220742C10C135448965E1F66A7EB04D6477D8FA11B0
                                                                                      SHA-512:4A6527FF5C7F0A0FDC574629714399D9A475EDC1338BF4C9EEEEDCC8CA23E14D2DE4DCA421D46FABA813A65236CD7B8ADBE103B641A763C6BC508738BF73A58C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Phoenix) {. {-9223372036854775808 -26898 0 LMT}. {-2717643600 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-820519140 -25200 0 MST}. {-796841940 -25200 0 MST}. {-94669200 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-56221200 -25200 0 MST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6398
                                                                                      Entropy (8bit):3.770736282266079
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5IV1C8phBVSWroLMEbF8xzqXtWl5Hm0RU+5oaIOWIF4IPWFeB/5udPOcBqYZ4vxl:mKXrvOTFhP5S+ijFnRaJeaX1eyDt
                                                                                      MD5:7802A7D0CAEECF52062EA9AAC665051A
                                                                                      SHA1:D965CD157A99FD258331A45F5E86B8F17A444D2B
                                                                                      SHA-256:3D1BEDC932E5CB6315438C7EF060824C927C547009EEA25E8CF16C9D8C4A28B6
                                                                                      SHA-512:4D369FF44CC1B1CBA75C0249B032581BA792830479D22C418C5B0599975E715B8983D93F52B00793F2A419F530BC8877D2DA251393592FD6B865499A97875FD8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Port-au-Prince) {. {-9223372036854775808 -17360 0 LMT}. {-2524504240 -17340 0 PPMT}. {-1670483460 -18000 0 EST}. {421218000 -14400 1 EDT}. {436334400 -18000 0 EST}. {452062800 -14400 1 EDT}. {467784000 -18000 0 EST}. {483512400 -14400 1 EDT}. {499233600 -18000 0 EST}. {514962000 -14400 1 EDT}. {530683200 -18000 0 EST}. {546411600 -14400 1 EDT}. {562132800 -18000 0 EST}. {576050400 -14400 1 EDT}. {594194400 -18000 0 EST}. {607500000 -14400 1 EDT}. {625644000 -18000 0 EST}. {638949600 -14400 1 EDT}. {657093600 -18000 0 EST}. {671004000 -14400 1 EDT}. {688543200 -18000 0 EST}. {702453600 -14400 1 EDT}. {719992800 -18000 0 EST}. {733903200 -14400 1 EDT}. {752047200 -18000 0 EST}. {765352800 -14400 1 EDT}. {783496800 -18000 0 EST}. {796802400 -14400 1 EDT}. {814946400 -18000 0 EST}. {828856800 -14400 1 EDT}. {846396000 -18000 0 EST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):155
                                                                                      Entropy (8bit):5.077805073731929
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52IAcGEuPXGkXGm2OHUnvUdxKzVvwvYv:SlSWB9X5290eSm2OHkzVr
                                                                                      MD5:8169D55899164E2168EF50E219115727
                                                                                      SHA1:42848A510C120D4E834BE61FC76A1C539BA88C8A
                                                                                      SHA-256:6C8718C65F99AB43377609705E773C93F7993FBB3B425E1989E8231308C475AF
                                                                                      SHA-512:1590D42E88DD92542CADC022391C286842C156DA4795877EA67FEF045E0A831615C3935E08098DD71CF29C972EDC79084FFCC9AFAB7813AE74EEE14D6CFEFB9D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Port_of_Spain) {. {-9223372036854775808 -14764 0 LMT}. {-1825098836 -14400 0 AST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):196
                                                                                      Entropy (8bit):4.818272118524638
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7thtedVAIgpthKQ290msh490thB:MBaIMYdxpR290v490x
                                                                                      MD5:1C0C736D0593654230FCBB0DC275313B
                                                                                      SHA1:00518615F97BCFF2F6862116F4DF834B70E2D4CA
                                                                                      SHA-256:5C97E6DF0FC03F13A0814274A9C3A983C474000AE3E78806B38DF9208372FD54
                                                                                      SHA-512:2252D17CB4F770124586BBF35974077212B92C1587071C9F552F1EFAC15CBF92128E61C456F9F5154D212F7D66CC5BD85B76B1187D5A6F24E89E14EDF322D67F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Rio_Branco)]} {. LoadTimeZoneFile America/Rio_Branco.}.set TZData(:America/Porto_Acre) $TZData(:America/Rio_Branco).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1016
                                                                                      Entropy (8bit):3.7660008200834842
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQQe478Sos/USws/QSI/LHSD/vOSy/WS3o/aS2/vSh/TSSX/WcSp/ySZd/YlSj/f:5bSaSwXS4SqSbS3JSySxSxcSESAlSQSv
                                                                                      MD5:5E4CB713378D22D90A1A86F0AF33D6E8
                                                                                      SHA1:CF4B2A68873BF778257D40AEA887D4BCBEE6CC72
                                                                                      SHA-256:6D7F49E0A67C69A3945DA4BC780653C8D875650536A810610A6518080CC483DB
                                                                                      SHA-512:06559B6E80BCDD42120398E19CCB3AEE8A1B08E09D0DF07DB9CCD68A863A7670D6D6457018CE3D9E23FE359D3E2EC0D249134EE0D969C0312665975B67DB8E80
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Porto_Velho) {. {-9223372036854775808 -15336 0 LMT}. {-1767210264 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {590036400
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):273
                                                                                      Entropy (8bit):4.728240676465187
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5290pbm2OH9VPMGoeVVFrZVVFUFkeF3k/eJpR/r:MBp5290lmdHvPMpe/ZZ/uFkeF3k/eJ/D
                                                                                      MD5:2FB893819124F19A7068F802D6A59357
                                                                                      SHA1:6B35C198F74FF5880714A3182407858193CE37A4
                                                                                      SHA-256:F05530CFBCE7242847BE265C2D26C8B95B00D927817B050A523FFB139991B09E
                                                                                      SHA-512:80739F431F6B3548EFD4F70FE3630F66F70CB29B66845B8072D26393ADD7DAB22675BE6DA5FBDC7561D4F3F214816AAD778B6CD0EE45264B4D6FFA48B3AC7C43
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Puerto_Rico) {. {-9223372036854775808 -15865 0 LMT}. {-2233035335 -14400 0 AST}. {-873057600 -10800 0 AWT}. {-769395600 -10800 1 APT}. {-765399600 -14400 0 AST}. {-757368000 -14400 0 AST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3576
                                                                                      Entropy (8bit):3.5316229197228632
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:Yv9+P8pYraRo+kP0pDrMb6UHlRnHqhTxxJAHXEa9c0yq/g2tw5E8fIk5iWpOFZAd:YoP8pYraRo+kP0pDrMb60RnHqhTxxJAw
                                                                                      MD5:1FFFED9AA83AA3CA9E7330AA27E8D188
                                                                                      SHA1:9B45F2662C1F3F0799ED4221E843483674878F43
                                                                                      SHA-256:FECDC08709D5852A07D8F5C7DD7DBDBCD3D864A0893248E3D3932A2F848EB4B2
                                                                                      SHA-512:8F6D51F94A91168EE092972316E150C2B487808EA3506F77FD028F84436FE29AD5BAD50A8DB65BCFB524D5A12DC1C66C5C0BC9A7FC6AE8A0EAAED6F4BA5ADED7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Punta_Arenas) {. {-9223372036854775808 -17020 0 LMT}. {-2524504580 -16966 0 SMT}. {-1892661434 -18000 0 -05}. {-1688410800 -16966 0 SMT}. {-1619205434 -14400 0 -04}. {-1593806400 -16966 0 SMT}. {-1335986234 -18000 0 -05}. {-1335985200 -14400 1 -05}. {-1317585600 -18000 0 -05}. {-1304362800 -14400 1 -05}. {-1286049600 -18000 0 -05}. {-1272826800 -14400 1 -05}. {-1254513600 -18000 0 -05}. {-1241290800 -14400 1 -05}. {-1222977600 -18000 0 -05}. {-1209754800 -14400 1 -05}. {-1191355200 -18000 0 -05}. {-1178132400 -14400 0 -04}. {-870552000 -18000 0 -05}. {-865278000 -14400 0 -04}. {-718056000 -18000 0 -05}. {-713649600 -14400 0 -04}. {-36619200 -10800 1 -04}. {-23922000 -14400 0 -04}. {-3355200 -10800 1 -04}. {7527600 -14400 0 -04}. {24465600 -10800 1 -04}. {37767600 -14400 0 -04}. {55915200 -10800 1 -04}. {69217200 -14400 0 -04}. {87
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7840
                                                                                      Entropy (8bit):3.75014960690837
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:k+iBktTzZSJw5/9/yuvQ+hcrD57X0N41+IestuNEbYkzbXwDTIRqfhXbdXvDXpVS:k+iBmTzZSJw5/9/yuvQ6crD57X0N41+a
                                                                                      MD5:9C10496730E961187C33C1AE91C8A60D
                                                                                      SHA1:A77E3508859FB6F76A7445CD13CD42348CB4EBC7
                                                                                      SHA-256:136F0A49742F30B05B7C6BF3BF014CC999104F4957715D0BEB39F5440D5216DF
                                                                                      SHA-512:70936E65D0B439F6BE6E31E27032F10BA2EB54672647DA615744ABC7A767F197F0C7FDBCCEE0D335CBCECB6855B7BD899D1A5B97BA5083FFA42AF5F30343EA7F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Rainy_River) {. {-9223372036854775808 -22696 0 LMT}. {-2366732504 -21600 0 CST}. {-1632067200 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-923248800 -18000 1 CDT}. {-880214400 -18000 0 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {136368000 -18000 1 CDT}. {152089200 -21600 0 CST}. {167817600 -18000 1 CDT}. {183538800 -21600 0 CST}. {199267200 -18000 1 CDT}. {215593200 -21600 0 CST}. {230716800 -18000 1 CDT}. {247042800 -21600 0 CST}. {262771200 -18000 1 CDT}. {278492400 -21600 0 CST}. {294220800 -18000 1 CDT}. {309942000 -21600 0 CST}. {325670400 -18000 1 CDT}. {341391600 -21600 0 CST}. {357120000 -18000 1 CDT}. {372841200 -21600 0 CST}. {388569600 -18000 1 CDT}. {404895600 -21600 0 CST}. {420019200 -18000 1 CDT}. {436345200 -21600 0 CST}. {452073600 -18000 1 CDT}. {467794800 -21600 0 CST}. {483523200 -18000 1 CDT}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7366
                                                                                      Entropy (8bit):3.749928775816306
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:vw5/9/yuvQ+hcrD57X0N41+IstuNEbYkzbXwDTIRqfhXbdXvDXpVXVto//q7u37N:vw5/9/yuvQ6crD57X0N41+IstuNEbYkJ
                                                                                      MD5:54F6D5098A0CF940F066EADEEA234A57
                                                                                      SHA1:20B9FE5F6F70E97420A6D9939AA43C4CCFA8231B
                                                                                      SHA-256:AA68088E41A018002E5CE12B14F8910E5ECE5F26D5854092E351BAAC2F90DB2B
                                                                                      SHA-512:9EC1AF599604CEE266D9A4377B6CDABF94E61D0177CBC2158122406BF551AE0E3EE4CF147B28A382277B015CCB8F4405DB3EB3AE6425431EBB43CCDE08AEA3E1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Rankin_Inlet) {. {-9223372036854775808 0 0 -00}. {-410227200 -21600 0 CST}. {-147895200 -14400 1 CDDT}. {-131565600 -21600 0 CST}. {325670400 -18000 1 CDT}. {341391600 -21600 0 CST}. {357120000 -18000 1 CDT}. {372841200 -21600 0 CST}. {388569600 -18000 1 CDT}. {404895600 -21600 0 CST}. {420019200 -18000 1 CDT}. {436345200 -21600 0 CST}. {452073600 -18000 1 CDT}. {467794800 -21600 0 CST}. {483523200 -18000 1 CDT}. {499244400 -21600 0 CST}. {514972800 -18000 1 CDT}. {530694000 -21600 0 CST}. {544608000 -18000 1 CDT}. {562143600 -21600 0 CST}. {576057600 -18000 1 CDT}. {594198000 -21600 0 CST}. {607507200 -18000 1 CDT}. {625647600 -21600 0 CST}. {638956800 -18000 1 CDT}. {657097200 -21600 0 CST}. {671011200 -18000 1 CDT}. {688546800 -21600 0 CST}. {702460800 -18000 1 CDT}. {719996400 -21600 0 CST}. {733910400 -18000 1 CDT}. {75205
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1372
                                                                                      Entropy (8bit):3.6943875149362064
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQHJeHQc4h1u80V2dBUGphmC17ewGtN3rvIh0VBHZDIykqWoN:5Kh4h19U2dBUGrmO7XGtN3kh0VBHZUnk
                                                                                      MD5:1567A3F3419D1A4FCF817A6EDC11769E
                                                                                      SHA1:2970F9EDD76B77A843D31F518587C17A05EC4C43
                                                                                      SHA-256:3F62246DF3A378815772D9D942033FB235B048B62F5EF52A3DCD6DB3871E0DB5
                                                                                      SHA-512:567BEAC48AE0FEEB32FE40EEA73EB4601DBDBF72FA963777E5F5C3E9972E2AD7A359301E80E574592AFB3045414A177D0ABD38DF958BD5317B02D4DFD2DCE607
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Recife) {. {-9223372036854775808 -8376 0 LMT}. {-1767217224 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-191365200 -7200 1 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}. {592974000 -7200 1 -03}. {60
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1723
                                                                                      Entropy (8bit):3.956012642028802
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:56ecDOBDgE+hIZVEa3lGw+6yZgTX+rNO46wYDW:86VlGS8
                                                                                      MD5:7D955B277C43D51F19377A91B987FAF9
                                                                                      SHA1:F2F3E11E955C3E58E21654F3D841B5B1528C0913
                                                                                      SHA-256:A1FA7BF002B3BA8DCA4D52AA0BB41C047DDAF88B2E542E1FCF81CB3AAF91AA75
                                                                                      SHA-512:719DEE7A932EDB9255D711E82AC0CA3FCFB07AF3EFE2EE0D887D7137F6059BEBE07F85D910CC0005391D244B4EADA16257BE49787938386FD4B5DB6D8E31D513
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Regina) {. {-9223372036854775808 -25116 0 LMT}. {-2030202084 -25200 0 MST}. {-1632063600 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1251651600 -21600 1 MDT}. {-1238349600 -25200 0 MST}. {-1220202000 -21600 1 MDT}. {-1206900000 -25200 0 MST}. {-1188752400 -21600 1 MDT}. {-1175450400 -25200 0 MST}. {-1156698000 -21600 1 MDT}. {-1144000800 -25200 0 MST}. {-1125248400 -21600 1 MDT}. {-1111946400 -25200 0 MST}. {-1032714000 -21600 1 MDT}. {-1016992800 -25200 0 MST}. {-1001264400 -21600 1 MDT}. {-986148000 -25200 0 MST}. {-969814800 -21600 1 MDT}. {-954093600 -25200 0 MST}. {-937760400 -21600 1 MDT}. {-922039200 -25200 0 MST}. {-906310800 -21600 1 MDT}. {-890589600 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-748450800 -21600 1 MDT}. {-732729600 -25200 0 MST}. {-715791600 -21600 1 MDT}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7362
                                                                                      Entropy (8bit):3.7460671071064846
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:iw5/9/yuvQ+hcrD57X0N41+IstuNESkzbXwDTIRqfhXbdXvDXpVXVto//q7u379L:iw5/9/yuvQ6crD57X0N41+IstuNESkzV
                                                                                      MD5:07FFF43B350D520D13D91701618AD72E
                                                                                      SHA1:8D4B36A6D3257509C209D0B78B58982709FB8807
                                                                                      SHA-256:39E13235F87A1B8621ADA62C9AD2EBF8E17687C5533658E075EFA70A04D5C78D
                                                                                      SHA-512:37397A2621F0A1EA6B46F6769D583CAEA9703924A2C652B8B58FA4C7DBA8E789BA8FE442FB2C77504E495617591FB138AD733063E3A4A0153ED2B26D4B863018
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Resolute) {. {-9223372036854775808 0 0 -00}. {-704937600 -21600 0 CST}. {-147895200 -14400 1 CDDT}. {-131565600 -21600 0 CST}. {325670400 -18000 1 CDT}. {341391600 -21600 0 CST}. {357120000 -18000 1 CDT}. {372841200 -21600 0 CST}. {388569600 -18000 1 CDT}. {404895600 -21600 0 CST}. {420019200 -18000 1 CDT}. {436345200 -21600 0 CST}. {452073600 -18000 1 CDT}. {467794800 -21600 0 CST}. {483523200 -18000 1 CDT}. {499244400 -21600 0 CST}. {514972800 -18000 1 CDT}. {530694000 -21600 0 CST}. {544608000 -18000 1 CDT}. {562143600 -21600 0 CST}. {576057600 -18000 1 CDT}. {594198000 -21600 0 CST}. {607507200 -18000 1 CDT}. {625647600 -21600 0 CST}. {638956800 -18000 1 CDT}. {657097200 -21600 0 CST}. {671011200 -18000 1 CDT}. {688546800 -21600 0 CST}. {702460800 -18000 1 CDT}. {719996400 -21600 0 CST}. {733910400 -18000 1 CDT}. {752050800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1075
                                                                                      Entropy (8bit):3.7557219407321303
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQYEeH5yyss/u/C5/ukCI/uiCk/u8CHe/uOCXs/um4Co/uN3Cc/ux8CL/uiFCy/i:5q5xs5IlTToo4mdGFtapG8dtedkFL
                                                                                      MD5:9AA66AEB91380EFD3313338A2DCBE432
                                                                                      SHA1:2D86915D1F331CC7050BBFAAE3315CE1440813C1
                                                                                      SHA-256:53DB45CF4CB369DA06C31478A793E787541DA0E77C042EBC7A10175A6BB6EFF6
                                                                                      SHA-512:C9B4F6544B4A1E77BFF6D423A9AD5E003E32FA77B00ECC2A7AF6D2279ACC849ABE331E5DE27C450A6BF86ECC2450CEBFAB4880AB69C54649D4C7EE0AF05CD377
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Rio_Branco) {. {-9223372036854775808 -16272 0 LMT}. {-1767209328 -18000 0 -05}. {-1206950400 -14400 1 -05}. {-1191355200 -18000 0 -05}. {-1175367600 -14400 1 -05}. {-1159819200 -18000 0 -05}. {-633812400 -14400 1 -05}. {-622062000 -18000 0 -05}. {-602276400 -14400 1 -05}. {-591825600 -18000 0 -05}. {-570740400 -14400 1 -05}. {-560203200 -18000 0 -05}. {-539118000 -14400 1 -05}. {-531345600 -18000 0 -05}. {-191358000 -14400 1 -05}. {-184190400 -18000 0 -05}. {-155156400 -14400 1 -05}. {-150062400 -18000 0 -05}. {-128890800 -14400 1 -05}. {-121118400 -18000 0 -05}. {-99946800 -14400 1 -05}. {-89582400 -18000 0 -05}. {-68410800 -14400 1 -05}. {-57960000 -18000 0 -05}. {499755600 -14400 1 -05}. {511243200 -18000 0 -05}. {530600400 -14400 1 -05}. {540273600 -18000 0 -05}. {562136400 -14400 1 -05}. {571204800 -18000 0 -05}. {590040000 -
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):214
                                                                                      Entropy (8bit):4.752946571641783
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7/MdVAIgp/MOF290rI5290/Msn:MBaIMY/M4p/MOF290r190/Ms
                                                                                      MD5:4FC460A084DF33A73F2F87B7962B0084
                                                                                      SHA1:45E70D5D68FC2DE0ACFF76B062ADA17E0021460F
                                                                                      SHA-256:D1F5FFD2574A009474230E0AA764256B039B1D78D91A1CB944B21776377B5B70
                                                                                      SHA-512:40045420FE88FA54DE4A656534C0A51357FBAB3EA3B9120DA15526A9DEC7EEC2C9799F4D9A72B6050474AD67490BC28540FDA0F17B7FCAF125D41CBCA96ECCDE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Argentina/Cordoba)]} {. LoadTimeZoneFile America/Argentina/Cordoba.}.set TZData(:America/Rosario) $TZData(:America/Argentina/Cordoba).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):189
                                                                                      Entropy (8bit):4.820569634622523
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qfSwVAIg20qfo2IAcGEtX2exp4IAcGEqfu:SlSWB9IZaM3y7eHVAIgpeo290tX2U49Q
                                                                                      MD5:75EA3845AFED3FBBF8496824A353DA32
                                                                                      SHA1:207A1520F041B09CCD5034E6E87D3F7A4FBD460E
                                                                                      SHA-256:2FACC167377FC1F592D2926829EB2980F58BE38D50424F64DFA04A2ECBBE1559
                                                                                      SHA-512:B9D4DB95CEA1DADCE27264BBD198676465854E9C55D6BB175966D860D9AF7014F6635A945510602C0A9FBF08596B064DAE7D30589886960F06B2F8E69786CFF6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Tijuana)]} {. LoadTimeZoneFile America/Tijuana.}.set TZData(:America/Santa_Isabel) $TZData(:America/Tijuana).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1043
                                                                                      Entropy (8bit):3.7336343389566795
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQceUh8Sos/USws/QSI/LHSD/vOSy/WS3o/aS2/vSh/TSSX/WcSp/ySZd/YlSj/X:57SaSwXS4SqSbS3JSySxSxcSESAlSQSn
                                                                                      MD5:8F5EAA4F5099B82EDD68893C5D99A0EF
                                                                                      SHA1:1B21DAD0CD54E083A6EADCFD57CA8F58759189AD
                                                                                      SHA-256:1A46357BC4FE682AF78FFAB10A6A88893BEF50AECC6ACA217A5EBC1B98C01C07
                                                                                      SHA-512:2C82822CCA208E900383A1B55882BFC3559EC116C5B5AD2452BA367594AEF36F34C316FFA18B2BAB71A82FC382559069385947548EE9902FEDCDED084801ABF2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Santarem) {. {-9223372036854775808 -13128 0 LMT}. {-1767212472 -14400 0 -04}. {-1206954000 -10800 1 -04}. {-1191358800 -14400 0 -04}. {-1175371200 -10800 1 -04}. {-1159822800 -14400 0 -04}. {-633816000 -10800 1 -04}. {-622065600 -14400 0 -04}. {-602280000 -10800 1 -04}. {-591829200 -14400 0 -04}. {-570744000 -10800 1 -04}. {-560206800 -14400 0 -04}. {-539121600 -10800 1 -04}. {-531349200 -14400 0 -04}. {-191361600 -10800 1 -04}. {-184194000 -14400 0 -04}. {-155160000 -10800 1 -04}. {-150066000 -14400 0 -04}. {-128894400 -10800 1 -04}. {-121122000 -14400 0 -04}. {-99950400 -10800 1 -04}. {-89586000 -14400 0 -04}. {-68414400 -10800 1 -04}. {-57963600 -14400 0 -04}. {499752000 -10800 1 -04}. {511239600 -14400 0 -04}. {530596800 -10800 1 -04}. {540270000 -14400 0 -04}. {562132800 -10800 1 -04}. {571201200 -14400 0 -04}. {590036400 -14
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8582
                                                                                      Entropy (8bit):3.4381885094053835
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:LCA/E8pYraRo+kP0pDrMb60RnHqhTxxJA3Ea9c0yq/g2tw5E8Q+iWMFeHpkUu9/6:LRNBnrR59bPYUt
                                                                                      MD5:47BED3B60EF45B00267B4D628A2F18C4
                                                                                      SHA1:B3827DF571CF2CA16074188CE0E3061E296B8B26
                                                                                      SHA-256:51BB12A2397CAD3D412C9E8F3BA06DD98CC379F999DB3D00ED651A84DA1D6D1C
                                                                                      SHA-512:8DA831A0EAB180C982395F2BA85952959A676AADA87823E56C5B643FEB7082B6605FD3645D880B19F3F9EE5B25353002309CDB37AE68F1B3A192AE1280B74404
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Santiago) {. {-9223372036854775808 -16966 0 LMT}. {-2524504634 -16966 0 SMT}. {-1892661434 -18000 0 -05}. {-1688410800 -16966 0 SMT}. {-1619205434 -14400 0 -04}. {-1593806400 -16966 0 SMT}. {-1335986234 -18000 0 -05}. {-1335985200 -14400 1 -05}. {-1317585600 -18000 0 -05}. {-1304362800 -14400 1 -05}. {-1286049600 -18000 0 -05}. {-1272826800 -14400 1 -05}. {-1254513600 -18000 0 -05}. {-1241290800 -14400 1 -05}. {-1222977600 -18000 0 -05}. {-1209754800 -14400 1 -05}. {-1191355200 -18000 0 -05}. {-1178132400 -14400 0 -04}. {-870552000 -18000 0 -05}. {-865278000 -14400 0 -04}. {-740520000 -10800 1 -03}. {-736376400 -14400 0 -04}. {-718056000 -18000 0 -05}. {-713649600 -14400 0 -04}. {-36619200 -10800 1 -04}. {-23922000 -14400 0 -04}. {-3355200 -10800 1 -04}. {7527600 -14400 0 -04}. {24465600 -10800 1 -04}. {37767600 -14400 0 -04}. {55
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):595
                                                                                      Entropy (8bit):4.2614212422453726
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp5290/SyJmdHhvPu4/G/uFNM/KMVvMj/+MVvMqx/r0XVvMnUB/B7VvMa6I8/0p:cQ+DJeVu4e/uICEkFvxwdqUBZp965VPO
                                                                                      MD5:04F2A2C789E041270354376C3FD90D2D
                                                                                      SHA1:D0B89262D559021FAC035A519C96D2A2FA417F9C
                                                                                      SHA-256:42EF317EA851A781B041DC1951EA5A3EA1E924149C4B868ECD75F24672B28FA8
                                                                                      SHA-512:F8D072527ED38C2FF1C9E08219104213352B2EFA1171C0D1E02B6B1542B4929D0C4640B441326791CC86F23206621CD4E0D3247CBAB1F99B63E65DB667F3DFED
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Santo_Domingo) {. {-9223372036854775808 -16776 0 LMT}. {-2524504824 -16800 0 SDMT}. {-1159773600 -18000 0 EST}. {-100119600 -14400 1 EDT}. {-89668800 -18000 0 EST}. {-5770800 -16200 1 -0430}. {4422600 -18000 0 EST}. {25678800 -16200 1 -0430}. {33193800 -18000 0 EST}. {57733200 -16200 1 -0430}. {64816200 -18000 0 EST}. {89182800 -16200 1 -0430}. {96438600 -18000 0 EST}. {120632400 -16200 1 -0430}. {127974600 -18000 0 EST}. {152082000 -14400 0 AST}. {975823200 -14400 0 AST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7552
                                                                                      Entropy (8bit):3.4588792656032914
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Lam19U2gUGrpzsVE0OjmicnyVkHZWWWE/+ZqPuWcBpR4xHtMlAbGCoGzvGmFGgh4:L3Yc8u9U
                                                                                      MD5:DEA27A3FE65A22BE42A97C6AB58E9687
                                                                                      SHA1:CD50184C4D1739CF5568E21683980FC63C9BFF24
                                                                                      SHA-256:AFA706258270F20F9317FF5B84957A2DF77842D564922C15DC302F7A8AB59CEC
                                                                                      SHA-512:34C306EC889C10988B3D9C236903417BCA1590E96CD60AE700882C064CCC410132265F106BB10D9593AFFA32B923728FBDDFB6DEE77CAF4A058C877F4D5F1EF1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Sao_Paulo) {. {-9223372036854775808 -11188 0 LMT}. {-1767214412 -10800 0 -03}. {-1206957600 -7200 1 -03}. {-1191362400 -10800 0 -03}. {-1175374800 -7200 1 -03}. {-1159826400 -10800 0 -03}. {-633819600 -7200 1 -03}. {-622069200 -10800 0 -03}. {-602283600 -7200 1 -03}. {-591832800 -10800 0 -03}. {-570747600 -7200 1 -03}. {-560210400 -10800 0 -03}. {-539125200 -7200 1 -03}. {-531352800 -10800 0 -03}. {-195429600 -7200 1 -02}. {-189381600 -7200 0 -03}. {-184197600 -10800 0 -03}. {-155163600 -7200 1 -03}. {-150069600 -10800 0 -03}. {-128898000 -7200 1 -03}. {-121125600 -10800 0 -03}. {-99954000 -7200 1 -03}. {-89589600 -10800 0 -03}. {-68418000 -7200 1 -03}. {-57967200 -10800 0 -03}. {499748400 -7200 1 -03}. {511236000 -10800 0 -03}. {530593200 -7200 1 -03}. {540266400 -10800 0 -03}. {562129200 -7200 1 -03}. {571197600 -10800 0 -03}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6593
                                                                                      Entropy (8bit):3.4670685654529194
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:URW/ukG9UDHaXZgsP/N/LWAWVF20V/VapcJlNcnkF0:BuZUDHaXZgsN/FWVFjHv0
                                                                                      MD5:7E7EF4D67CCD455833603F7EF9E374A6
                                                                                      SHA1:4AD722F75FC88572DD5A2CD1845FF5F68ED4B58A
                                                                                      SHA-256:2B5B2A00793545C8D32437D7DAA2A36B42D3B1B7421054621841E2919F713294
                                                                                      SHA-512:0688EB3EBDE78E18EE5E31DE57F1CBE0BF10071A6EDC97D284B2B3E1E22975262190934446C202E90EFD161686F4790342EDDBCACADB3A65B0AC6C1A9099C79F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Scoresbysund) {. {-9223372036854775808 -5272 0 LMT}. {-1686090728 -7200 0 -02}. {323841600 -3600 0 -01}. {338961600 -7200 0 -02}. {354679200 0 0 +00}. {370400400 -3600 0 -01}. {386125200 0 1 +00}. {401850000 -3600 0 -01}. {417574800 0 1 +00}. {433299600 -3600 0 -01}. {449024400 0 1 +00}. {465354000 -3600 0 -01}. {481078800 0 1 +00}. {496803600 -3600 0 -01}. {512528400 0 1 +00}. {528253200 -3600 0 -01}. {543978000 0 1 +00}. {559702800 -3600 0 -01}. {575427600 0 1 +00}. {591152400 -3600 0 -01}. {606877200 0 1 +00}. {622602000 -3600 0 -01}. {638326800 0 1 +00}. {654656400 -3600 0 -01}. {670381200 0 1 +00}. {686106000 -3600 0 -01}. {701830800 0 1 +00}. {717555600 -3600 0 -01}. {733280400 0 1 +00}. {749005200 -3600 0 -01}. {764730000 0 1 +00}. {780454800 -3600 0 -01}. {796179600 0 1 +00}. {811904400 -3600 0 -01}. {828234000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):182
                                                                                      Entropy (8bit):4.840231755053259
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx06RGFwVAIg206RAO0L2IAcGEtOFBx+IAcGE6Ru:SlSWB9IZaM3y7+SwVAIgp+iL290tO09G
                                                                                      MD5:65307038DB12A7A447284DF4F3E6A3E8
                                                                                      SHA1:DC28D6863986D7A158CEF239D46BE9F5033DF897
                                                                                      SHA-256:3FD862C9DB2D5941DFDBA5622CC53487A7FC5039F7012B78D3EE4B58753D078D
                                                                                      SHA-512:91BC29B7EC9C49D4020DC26F682D0EFBBBEE83D10D79C766A08C78D5FF04D9C0A09288D9696A378E777B65E0C2C2AC8A218C12F86C45BD6E7B5E204AE5FC2335
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Denver)]} {. LoadTimeZoneFile America/Denver.}.set TZData(:America/Shiprock) $TZData(:America/Denver).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8376
                                                                                      Entropy (8bit):3.8793735356495116
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:lG19jJps/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:lM9jI/4h5sBPy+CMt/ElALLVuAH
                                                                                      MD5:2F2C91BD29B32A281F9FB1F811953ACB
                                                                                      SHA1:49102C37397CC9B7CDCDCE6A76F9BE03D0B446AB
                                                                                      SHA-256:6ABBF55FEE7839B9EEEBB97EA53E185E1A0E189843531257708258841A35EB76
                                                                                      SHA-512:FB06D4FE28BD9DD9D56A7365F1E2CC7434678B8850CECF99A232F07B4B720F092980EC337C279E599A12E54548DE6AC253547FE4C255BEFA7B545F8C93375589
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Sitka) {. {-9223372036854775808 53927 0 LMT}. {-3225223727 -32473 0 LMT}. {-2188954727 -28800 0 PST}. {-883584000 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-757353600 -28800 0 PST}. {-31507200 -28800 0 PST}. {-21477600 -25200 1 PDT}. {-5756400 -28800 0 PST}. {9972000 -25200 1 PDT}. {25693200 -28800 0 PST}. {41421600 -25200 1 PDT}. {57747600 -28800 0 PST}. {73476000 -25200 1 PDT}. {89197200 -28800 0 PST}. {104925600 -25200 1 PDT}. {120646800 -28800 0 PST}. {126698400 -25200 1 PDT}. {152096400 -28800 0 PST}. {162381600 -25200 1 PDT}. {183546000 -28800 0 PST}. {199274400 -25200 1 PDT}. {215600400 -28800 0 PST}. {230724000 -25200 1 PDT}. {247050000 -28800 0 PST}. {262778400 -25200 1 PDT}. {278499600 -28800 0 PST}. {294228000 -25200 1 PDT}. {309949200 -28800 0 PST}. {325677600 -
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):208
                                                                                      Entropy (8bit):4.905980413237828
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290txP90e/:MBaIMY9QpI2907P90O
                                                                                      MD5:B6E45D20EB8CC73A77B9A75578E5C246
                                                                                      SHA1:19C6BB6ED12B6943CF7BDFFE4C8A8D72DB491E44
                                                                                      SHA-256:31E60EAC8ABFA8D3DAD501D3BCDCA7C4DB7031B65ADDA24EC11A6DEE1E3D14C3
                                                                                      SHA-512:C0F3BF8D106E77C1000E45D0A6C8E7C05B7B97EFA2EECCA45FEF48EB42FBDD5336FD551C794064EADFB6919A12813FF66B2F95722877432B4A48B1FBA6C5409D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Barthelemy) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):10917
                                                                                      Entropy (8bit):3.7872036312069963
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Vvprjhbvd8mSGu9EnkBVAZK2GrbrvZeuqpNFT:Vvbvd7SGu9lzoVpDT
                                                                                      MD5:F87531D6DC9AAFB2B0F79248C5ADA772
                                                                                      SHA1:E14C52B0F564FA3A3536B7576A2B27D4738CA76B
                                                                                      SHA-256:0439DA60D4C52F0E777431BF853D366E2B5D89275505201080954D88F6CA9478
                                                                                      SHA-512:5B43CE25D970EEEFD09865D89137388BD879C599191DE8ACE37DA657C142B6DF63143DBF9DED7659CBD5E45BAB699E2A3AFDD28C76A7CB2F300EBD9B74CDA59D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/St_Johns) {. {-9223372036854775808 -12652 0 LMT}. {-2713897748 -12652 0 NST}. {-1664130548 -9052 1 NDT}. {-1650137348 -12652 0 NST}. {-1640982548 -12652 0 NST}. {-1632076148 -9052 1 NDT}. {-1615145348 -12652 0 NST}. {-1609446548 -12652 0 NST}. {-1598650148 -9052 1 NDT}. {-1590100148 -12652 0 NST}. {-1567286948 -9052 1 NDT}. {-1551565748 -12652 0 NST}. {-1535837348 -9052 1 NDT}. {-1520116148 -12652 0 NST}. {-1503782948 -9052 1 NDT}. {-1488666548 -12652 0 NST}. {-1472333348 -9052 1 NDT}. {-1457216948 -12652 0 NST}. {-1440883748 -9052 1 NDT}. {-1425767348 -12652 0 NST}. {-1409434148 -9052 1 NDT}. {-1394317748 -12652 0 NST}. {-1377984548 -9052 1 NDT}. {-1362263348 -12652 0 NST}. {-1346534948 -9052 1 NDT}. {-1330813748 -12652 0 NST}. {-1314480548 -9052 1 NDT}. {-1299364148 -12652 0 NST}. {-1283030948 -9052 1 NDT}. {-1267914548 -12652 0 NS
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):203
                                                                                      Entropy (8bit):4.878034750755565
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290tMp490e/:MBaIMY9QpI290g490O
                                                                                      MD5:B149DC2A23F741BA943E5511E35370D3
                                                                                      SHA1:3C8D3CFDB329B7ECB90C19D3EB3DE6F33A063ADD
                                                                                      SHA-256:36046A74F6BB23EA8EABA25AD3B93241EBB509EF1821CC4BEC860489F5EC6DCA
                                                                                      SHA-512:CEB38EC2405A3B0A4E09CDD2D69A11884CCB28DA0FD7CF8B344E1472642A0571674D3ED33C639E745DDEEE741E52B0948B86DFFFD324BB07A9F1A6B9F38F898E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Kitts) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):203
                                                                                      Entropy (8bit):4.89157166321909
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0uPXoFVAIg20uPXhF2IAcGEtkS+IAcGEuPX/:SlSWB9IZaM3y7eoFVAIgpeX290tY90e/
                                                                                      MD5:7B7FCA150465F48FAC9F392C079B6376
                                                                                      SHA1:1B501288CC00E8B90A2FAD82619B49A9DDBE4475
                                                                                      SHA-256:87203A4BF42B549FEBF467CC51E8BCAE01BE1A44C193BED7E2D697B1C3D268C9
                                                                                      SHA-512:5E4F7EE08493547A012144884586D45020D83B5838254C257FD341B8B6D3F9E279013D068EFC7D6DF7569DDD20122B3B23E9C93A0017FB64E941A50311ED1F18
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Lucia) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):204
                                                                                      Entropy (8bit):4.888871207225013
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290tXIMFJ490e/:MBaIMY9QpI290tJ490O
                                                                                      MD5:7E272CE31D788C2556FF7421F6832314
                                                                                      SHA1:A7D89A1A9AC2B61D98690126D1E4C1595E160C8F
                                                                                      SHA-256:F0E10D45C929477A803085B2D4CE02EE31FD1DB24855836D02861AD246BC34D9
                                                                                      SHA-512:CCDF0B1B5971B77F6FA27F25900DB1AB9A4A4C69E15DCDF4EA35E1E1FC31AAD957C2E5862B411B0155BB1E25E2DD417A89168295317B1E603DA59142D76CE80A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Thomas) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):205
                                                                                      Entropy (8bit):4.876306758637305
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290tzb+Q90e/:MBaIMY9QpI290xyQ90O
                                                                                      MD5:52DAAF1636B5B70E0BA2015E9F322A74
                                                                                      SHA1:4BD05207601CF6DB467C27052EBB25C9A64DAC96
                                                                                      SHA-256:A5B3687BBA1D14D52599CB355BA5F4399632BF98DF4CEB258F9C479B1EA73586
                                                                                      SHA-512:E3DE0447236F6EA24D173CCB46EA1A4A31B5FFBCE2A442CD542DA8C54DAD22391FD1CA301776C0FB07CBCF256FC708E61B7BBA682C02EEBE03BECCEA2B6D3BD0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/St_Vincent) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):845
                                                                                      Entropy (8bit):4.182525430299964
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQce7eUFLxsOCX+FmFyyFDVFdPFxFZA8uFZYV:5NecLGO+6yZzXDZA8KZG
                                                                                      MD5:1502A6DD85B55B9619E42D1E08C09738
                                                                                      SHA1:70FF58E29CCDB53ABABA7EBD449A9B34AC152AA6
                                                                                      SHA-256:54E541D1F410AFF34CE898BBB6C7CC945B66DFC9D7C4E986BD9514D14560CC6F
                                                                                      SHA-512:99F0EFF9F2DA4CDD6AB508BB85002F38B01BDFDE0CBA1EB2F4B5CA8EAD8AAB645A3C26BECF777DE49574111B37F847EFF9320331AC07E84C8E892B688B01D36B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Swift_Current) {. {-9223372036854775808 -25880 0 LMT}. {-2030201320 -25200 0 MST}. {-1632063600 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-747241200 -21600 0 MDT}. {-732729600 -25200 0 MST}. {-715791600 -21600 1 MDT}. {-702489600 -25200 0 MST}. {-684342000 -21600 1 MDT}. {-671040000 -25200 0 MST}. {-652892400 -21600 1 MDT}. {-639590400 -25200 0 MST}. {-631126800 -25200 0 MST}. {-400086000 -21600 1 MDT}. {-384364800 -25200 0 MST}. {-337186800 -21600 1 MDT}. {-321465600 -25200 0 MST}. {-305737200 -21600 1 MDT}. {-292435200 -25200 0 MST}. {-273682800 -21600 1 MDT}. {-260985600 -25200 0 MST}. {73472400 -21600 0 CST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):329
                                                                                      Entropy (8bit):4.580220354026118
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5290Em2OHskeRbV1UcgdrV/uFn/acD3/uFn/sb9/uFn/yn:MBp5290EmdHsVH1UDB/uFn/z/uFn/k/N
                                                                                      MD5:004588073FADF67C3167FF007759BCEA
                                                                                      SHA1:64A6344776A95E357071D4FC65F71673382DAF9D
                                                                                      SHA-256:55C18EA96D3BA8FD9E8C4F01D4713EC133ACCD2C917EC02FD5E74A4E0089BFBF
                                                                                      SHA-512:ADC834C393C5A3A7BFD86A933E7C7F594AC970A3BD1E38110467A278DC4266D81C3E96394C102E565F05DE7FBBDA623C673597E19BEC1EA26AB12E4354991066
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Tegucigalpa) {. {-9223372036854775808 -20932 0 LMT}. {-1538503868 -21600 0 CST}. {547020000 -18000 1 CDT}. {559717200 -21600 0 CST}. {578469600 -18000 1 CDT}. {591166800 -21600 0 CST}. {1146981600 -18000 1 CDT}. {1154926800 -21600 0 CST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6666
                                                                                      Entropy (8bit):3.7481713130223295
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:pJunToVmM7IEc2fVGYu2yeB/T/eleWmBk81kS/kV6kef4zjyvUP/ZbJitpJxSIRj:pAWJv
                                                                                      MD5:8FFE81344C31A51489A254DE97E83C3E
                                                                                      SHA1:4397D9EDAC304668D95921EF03DFD90F967E772F
                                                                                      SHA-256:EF6AF4A3FA500618B37AF3CDD40C475E54347D7510274051006312A42C79F20C
                                                                                      SHA-512:F34A6D44499DE5A4E328A8EAFBA5E77B1B8C04A843160D74978398F1545C821C3034FCBD5ADBFAD8D14D1688907C57E7570023ABD3096D4E4C19E3D3C04428B3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Thule) {. {-9223372036854775808 -16508 0 LMT}. {-1686079492 -14400 0 AST}. {670399200 -10800 1 ADT}. {686120400 -14400 0 AST}. {701848800 -10800 1 ADT}. {717570000 -14400 0 AST}. {733903200 -10800 1 ADT}. {752043600 -14400 0 AST}. {765352800 -10800 1 ADT}. {783493200 -14400 0 AST}. {796802400 -10800 1 ADT}. {814942800 -14400 0 AST}. {828856800 -10800 1 ADT}. {846392400 -14400 0 AST}. {860306400 -10800 1 ADT}. {877842000 -14400 0 AST}. {891756000 -10800 1 ADT}. {909291600 -14400 0 AST}. {923205600 -10800 1 ADT}. {941346000 -14400 0 AST}. {954655200 -10800 1 ADT}. {972795600 -14400 0 AST}. {986104800 -10800 1 ADT}. {1004245200 -14400 0 AST}. {1018159200 -10800 1 ADT}. {1035694800 -14400 0 AST}. {1049608800 -10800 1 ADT}. {1067144400 -14400 0 AST}. {1081058400 -10800 1 ADT}. {1099198800 -14400 0 AST}. {1112508000 -10800 1 ADT}. {1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8058
                                                                                      Entropy (8bit):3.7473289441354263
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:hePraC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:hirrn+qvOTFhPI1jFIL
                                                                                      MD5:CE6E17F16AA8BAD3D9DB8BD2E61A6406
                                                                                      SHA1:7DF466E7BB5EDD8E1CDF0ADC8740248EF31ECB15
                                                                                      SHA-256:E29F83A875E2E59EC99A836EC9203D5ABC2355D6BD4683A5AEAF31074928D572
                                                                                      SHA-512:833300D17B7767DE74E6F2757513058FF5B25A9E7A04AB97BBBFFAC5D9ADCC43366A5737308894266A056382D2589D0778EEDD85D56B0F336C84054AB05F1079
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Thunder_Bay) {. {-9223372036854775808 -21420 0 LMT}. {-2366733780 -21600 0 CST}. {-1893434400 -18000 0 EST}. {-883594800 -18000 0 EST}. {-880218000 -14400 1 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {18000 -18000 0 EST}. {9961200 -14400 1 EDT}. {25682400 -18000 0 EST}. {41410800 -14400 1 EDT}. {57736800 -18000 0 EST}. {73465200 -14400 1 EDT}. {89186400 -18000 0 EST}. {94712400 -18000 0 EST}. {126248400 -18000 0 EST}. {136364400 -14400 1 EDT}. {152085600 -18000 0 EST}. {167814000 -14400 1 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -18000 0 EST}. {294217200 -14400 1 EDT}. {309938400 -18000 0 EST}. {325666800 -14400 1 EDT}. {341388000 -18000 0 EST}. {357116400 -14400 1 EDT}. {372837600
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8470
                                                                                      Entropy (8bit):3.767364707906483
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:mb4O5mC2ZCAFBWsBNwj/lpmlOxGcKcnRH31t+ucgge:Q5DaYaNwj/lpmlOxnKcndIG
                                                                                      MD5:F76D5FB5BC773872B556A6EDF660E5CC
                                                                                      SHA1:3FD19FCD0FFD3308D2E7D9A3553C14B6A6C3A903
                                                                                      SHA-256:170540AA3C0962AFE4267F83AC679241B2D135B1C18E8E7220C2608B94DDDE0E
                                                                                      SHA-512:7FC5D2BC39EF3A3C902A56272474E28CD9C56DE37A7AE9FAEADE974993677CCF3A9E6CE64C064D69B7587BD47951BFFFD751412D97F4066656CBB42AD9B619DF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Tijuana) {. {-9223372036854775808 -28084 0 LMT}. {-1514736000 -25200 0 MST}. {-1451667600 -28800 0 PST}. {-1343062800 -25200 0 MST}. {-1234803600 -28800 0 PST}. {-1222963200 -25200 1 PDT}. {-1207242000 -28800 0 PST}. {-873820800 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-761677200 -28800 0 PST}. {-686073600 -25200 1 PDT}. {-661539600 -28800 0 PST}. {-504892800 -28800 0 PST}. {-495039600 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463590000 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431535600 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400086000 -25200 1 PDT}. {-386780400 -28800 0 PST}. {-368636400 -25200 1 PDT}. {-355330800 -28800 0 PST}. {-337186800 -25200 1 PDT}. {-323881200 -28800 0 PST}. {-305737200 -25200 1 PDT}. {-292431600 -28800 0 PST}. {-283968000 -28800 0 PST}. {189331200 -28800 0 PST}. {199274400 -25200 1 PDT}. {21560
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):10883
                                                                                      Entropy (8bit):3.7202964099536917
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:9wUYG1dbgZ8UMrEUWraC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:9wS1dbgZ8UMrVWrrn+qvOTFhPI1jFIL
                                                                                      MD5:9C60AFDFA3BA2002BA68673B778194CF
                                                                                      SHA1:D6D17C82AEC4B85BA7B0F6FCB36A7582CA26A82B
                                                                                      SHA-256:7744DB6EFE39D636F1C88F8325ED3EB6BF8FA615F52A60333A58BCE579983E87
                                                                                      SHA-512:3C793BB00725CF37474683EAB70A0F2B2ACAE1656402CDD7E75182988DC20361A8651A624A5220983E3E05333B9817DCBEAF20D34BD55C5128F55474A02A9455
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Toronto) {. {-9223372036854775808 -19052 0 LMT}. {-2366736148 -18000 0 EST}. {-1632070800 -14400 1 EDT}. {-1615140000 -18000 0 EST}. {-1609441200 -18000 0 EST}. {-1601753400 -14400 1 EDT}. {-1583697600 -18000 0 EST}. {-1567357200 -14400 1 EDT}. {-1554667200 -18000 0 EST}. {-1534698000 -14400 1 EDT}. {-1524074400 -18000 0 EST}. {-1503248400 -14400 1 EDT}. {-1492365600 -18000 0 EST}. {-1471798800 -14400 1 EDT}. {-1460916000 -18000 0 EST}. {-1440954000 -14400 1 EDT}. {-1428861600 -18000 0 EST}. {-1409504400 -14400 1 EDT}. {-1397412000 -18000 0 EST}. {-1378054800 -14400 1 EDT}. {-1365962400 -18000 0 EST}. {-1346605200 -14400 1 EDT}. {-1333908000 -18000 0 EST}. {-1315155600 -14400 1 EDT}. {-1301853600 -18000 0 EST}. {-1283706000 -14400 1 EDT}. {-1270404000 -18000 0 EST}. {-1252256400 -14400 1 EDT}. {-1238954400 -18000 0 EST}. {-1220806800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):202
                                                                                      Entropy (8bit):4.854311472609309
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290RRKl290e/:MBaIMY9QpI290V90O
                                                                                      MD5:B931564D937C807282F1432FF6EA52A6
                                                                                      SHA1:7ECA025D97717EEA7C91B5390122D3A47A25CAD0
                                                                                      SHA-256:FF5CF153C4EC65E7E57A608A481F12939B6E4ACC8D62C5B01FEB5A04769A6F07
                                                                                      SHA-512:97271500C7D7959B90A6AC0A98D5D0D29DA00E92F9FC973594267DF906DEE767243698DBA2F3A0CF00156E949E29CDDD45A151F263583514090717CFDF1FB4DD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Tortola) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9495
                                                                                      Entropy (8bit):3.7630000632404426
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:2f7f/5LB6xi9C7Nf+aNwj/lpmlOxnKcndIG:2f735LB6xi9cfefnK6
                                                                                      MD5:1ACC41DA124C0CA5E67432760FDC91EC
                                                                                      SHA1:13F56C3F53076E0027BB8C5814EC81256A37F4AF
                                                                                      SHA-256:DFC19B5231F6A0AB9E9B971574FB612695A425A3B290699DF2819D46F1250DB0
                                                                                      SHA-512:2F2E358F5743248DE946B90877EFCCCACAF039956249F17D24B7DA026830A181A125045E2C8937A6ACD674E32887049F2D36A1941F09803DF514ADCDA4055CC5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Vancouver) {. {-9223372036854775808 -29548 0 LMT}. {-2713880852 -28800 0 PST}. {-1632060000 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-747237600 -25200 1 PDT}. {-732726000 -28800 0 PST}. {-715788000 -25200 1 PDT}. {-702486000 -28800 0 PST}. {-684338400 -25200 1 PDT}. {-671036400 -28800 0 PST}. {-652888800 -25200 1 PDT}. {-639586800 -28800 0 PST}. {-620834400 -25200 1 PDT}. {-608137200 -28800 0 PST}. {-589384800 -25200 1 PDT}. {-576082800 -28800 0 PST}. {-557935200 -25200 1 PDT}. {-544633200 -28800 0 PST}. {-526485600 -25200 1 PDT}. {-513183600 -28800 0 PST}. {-495036000 -25200 1 PDT}. {-481734000 -28800 0 PST}. {-463586400 -25200 1 PDT}. {-450284400 -28800 0 PST}. {-431532000 -25200 1 PDT}. {-418230000 -28800 0 PST}. {-400082400 -25200 1 PDT}. {-386
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):201
                                                                                      Entropy (8bit):4.901732290886438
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7eoFVAIgpeX290RXgr490e/:MBaIMY9QpI290xg090O
                                                                                      MD5:DEB77B4016D310DFB38E6587190886FB
                                                                                      SHA1:B308A2D187C153D3ED821B205A4F2D0F73DA94B0
                                                                                      SHA-256:A6B8CFE8B9381EC61EAB553CFA2A815F93BBB224A6C79D74C08AC54BE4B8413B
                                                                                      SHA-512:04A0D598A24C0F3A1881D3412352F65C610F75281CC512B46248847A798A12AEA551E3DE9EA3FD5BB6B3687A0BB65746392F301F72746876D30697D66B3A3604
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Port_of_Spain)]} {. LoadTimeZoneFile America/Port_of_Spain.}.set TZData(:America/Virgin) $TZData(:America/Port_of_Spain).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7613
                                                                                      Entropy (8bit):3.789738507183991
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:hmD+C2ZCHtffWsBNwj/lpmlOxGcKcnRH31t+ucgge:hm3Nf+aNwj/lpmlOxnKcndIG
                                                                                      MD5:CBCFD98E08FCCEB580F66AFE8E670AF5
                                                                                      SHA1:7E922CCD99CD7758709205E4C9210A2F09F09800
                                                                                      SHA-256:72992080AA9911184746633C7D6E47570255EE85CC6FE5E843F62331025B2A61
                                                                                      SHA-512:18290654E5330186B739DEDBC7D6860FD017D089DAE19E480F868E1FB56A3CF2E685D0099C4CF1D4F2AE5F36D0B72ABE52FBAC29AD4F6AB8A45C4C420D90E2D5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Whitehorse) {. {-9223372036854775808 -32412 0 LMT}. {-2188997988 -32400 0 YST}. {-1632056400 -28800 1 YDT}. {-1615125600 -32400 0 YST}. {-1596978000 -28800 1 YDT}. {-1583164800 -32400 0 YST}. {-880203600 -28800 1 YWT}. {-769395600 -28800 1 YPT}. {-765381600 -32400 0 YST}. {-147884400 -25200 1 YDDT}. {-131554800 -32400 0 YST}. {315561600 -28800 0 PST}. {325677600 -25200 1 PDT}. {341398800 -28800 0 PST}. {357127200 -25200 1 PDT}. {372848400 -28800 0 PST}. {388576800 -25200 1 PDT}. {404902800 -28800 0 PST}. {420026400 -25200 1 PDT}. {436352400 -28800 0 PST}. {452080800 -25200 1 PDT}. {467802000 -28800 0 PST}. {483530400 -25200 1 PDT}. {499251600 -28800 0 PST}. {514980000 -25200 1 PDT}. {530701200 -28800 0 PST}. {544615200 -25200 1 PDT}. {562150800 -28800 0 PST}. {576064800 -25200 1 PDT}. {594205200 -28800 0 PST}. {607514400 -25200 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9379
                                                                                      Entropy (8bit):3.7354364023000937
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:t7K22m2eQ7SRWu3O559BxXWDpws1dwVyUAitGeZiSI0PMnp4ozDCM9LfLPix3QWZ:t7K22m2eQ7Swu3O559BxXWDpws1dwVyU
                                                                                      MD5:F6B8A2DA74DC3429EC1FAF7A38CB0361
                                                                                      SHA1:1651AD179DB98C9755CDF17FBFC29EF35DE7F588
                                                                                      SHA-256:FEAA62063316C8F4AD5FABBF5F2A7DD21812B6658FEC40893657E909DE605317
                                                                                      SHA-512:46C61EFF429075A77C01AF1C02FD6136529237B30B7F06795BCEE26CDB75DDAB2D418283CD95C9A0140D1510E02F393F0A7E9414C99D1B31301AE213BAF50681
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Winnipeg) {. {-9223372036854775808 -23316 0 LMT}. {-2602258284 -21600 0 CST}. {-1694368800 -18000 1 CDT}. {-1681671600 -21600 0 CST}. {-1632067200 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1029686400 -18000 1 CDT}. {-1018198800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-746035200 -18000 1 CDT}. {-732733200 -21600 0 CST}. {-715795200 -18000 1 CDT}. {-702493200 -21600 0 CST}. {-684345600 -18000 1 CDT}. {-671043600 -21600 0 CST}. {-652896000 -18000 1 CDT}. {-639594000 -21600 0 CST}. {-620755200 -18000 1 CDT}. {-607626000 -21600 0 CST}. {-589392000 -18000 1 CDT}. {-576090000 -21600 0 CST}. {-557942400 -18000 1 CDT}. {-544640400 -21600 0 CST}. {-526492800 -18000 1 CDT}. {-513190800 -21600 0 CST}. {-495043200 -18000 1 CDT}. {-481741200 -21600 0 CST}. {-463593600 -18000 1 CDT}. {-
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8407
                                                                                      Entropy (8bit):3.8776961667057868
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:ugOZVKyjVYus/Q7Ddh5sBPyNsSLFOMM/EowALVZVmWa86Eac8rQ:uBZVKH/4h5sBPy+CMt/ElALLVuAH
                                                                                      MD5:9C0E781669E3E5549F82ED378EE3423B
                                                                                      SHA1:32184EA198156731C58616A0D88F169441C8CC7F
                                                                                      SHA-256:FE1C632FE9AF7E54A8CC9ED839818FAE98F14928921FD78C92A8D8E22F07A415
                                                                                      SHA-512:D1CDAB3DBAFFB4C30F6EEBDD413D748980C156437FBE99E7DF0C1E17AFA4CC33876AF2BB44C90E1FE5347071E64E83823EED47AE9BE39863C12989CB3EA44BDA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Yakutat) {. {-9223372036854775808 52865 0 LMT}. {-3225223727 -33535 0 LMT}. {-2188953665 -32400 0 YST}. {-883580400 -32400 0 YST}. {-880203600 -28800 1 YWT}. {-769395600 -28800 1 YPT}. {-765381600 -32400 0 YST}. {-757350000 -32400 0 YST}. {-31503600 -32400 0 YST}. {-21474000 -28800 1 YDT}. {-5752800 -32400 0 YST}. {9975600 -28800 1 YDT}. {25696800 -32400 0 YST}. {41425200 -28800 1 YDT}. {57751200 -32400 0 YST}. {73479600 -28800 1 YDT}. {89200800 -32400 0 YST}. {104929200 -28800 1 YDT}. {120650400 -32400 0 YST}. {126702000 -28800 1 YDT}. {152100000 -32400 0 YST}. {162385200 -28800 1 YDT}. {183549600 -32400 0 YST}. {199278000 -28800 1 YDT}. {215604000 -32400 0 YST}. {230727600 -28800 1 YDT}. {247053600 -32400 0 YST}. {262782000 -28800 1 YDT}. {278503200 -32400 0 YST}. {294231600 -28800 1 YDT}. {309952800 -32400 0 YST}. {325681200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7485
                                                                                      Entropy (8bit):3.781666511020802
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:rGzGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:zVUC2mWBNwWTxyWR
                                                                                      MD5:C9050AC32086644B15631E6FBE4D6292
                                                                                      SHA1:8C074D0E04CAFB1BDD11953AE77687CFBC53C449
                                                                                      SHA-256:447B801066A92624F58C00DA66FBB90B54195F4AB06886AE4796228244E19E85
                                                                                      SHA-512:E7C73E67B247F912E774EF245D2323B24DDF75054C7BE9095BC19E3C58CB5AE287747076B2436ABF735738A969DAFCDB128F0BA2C76A0AFAB5449CF157BEB190
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:America/Yellowknife) {. {-9223372036854775808 0 0 -00}. {-1104537600 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-147891600 -18000 1 MDDT}. {-131562000 -25200 0 MST}. {315558000 -25200 0 MST}. {325674000 -21600 1 MDT}. {341395200 -25200 0 MST}. {357123600 -21600 1 MDT}. {372844800 -25200 0 MST}. {388573200 -21600 1 MDT}. {404899200 -25200 0 MST}. {420022800 -21600 1 MDT}. {436348800 -25200 0 MST}. {452077200 -21600 1 MDT}. {467798400 -25200 0 MST}. {483526800 -21600 1 MDT}. {499248000 -25200 0 MST}. {514976400 -21600 1 MDT}. {530697600 -25200 0 MST}. {544611600 -21600 1 MDT}. {562147200 -25200 0 MST}. {576061200 -21600 1 MDT}. {594201600 -25200 0 MST}. {607510800 -21600 1 MDT}. {625651200 -25200 0 MST}. {638960400 -21600 1 MDT}. {657100800 -25200 0 MST}. {671014800 -21600 1 MDT}. {68
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):316
                                                                                      Entropy (8bit):4.338100448107153
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52L09xvFJm2OHlFFbQMFUkjtjKNUkMQTVsklkQEJ:MBp52Lc9mdHfFbQMF5jdK3zTVxE
                                                                                      MD5:4AD8AC155D466E47A6BF075508DC05ED
                                                                                      SHA1:2C911F651B26C27C07756111B5291C63C6954D34
                                                                                      SHA-256:282A352404B30C4336C0E09F3C5371393511C602B9E55648FB0251EACC9C715D
                                                                                      SHA-512:4A7305653D700FF565C9747C8A4E69A79609EB4748F3FFAA60C5A8548BBFAEC541EB8EAF830FF9202508BEAFAC2A0895BC4A52473FA51EBC74FAD83FCD0EB8F5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Casey) {. {-9223372036854775808 0 0 -00}. {-31536000 28800 0 +08}. {1255802400 39600 0 +11}. {1267714800 28800 0 +08}. {1319738400 39600 0 +11}. {1329843600 28800 0 +08}. {1477065600 39600 0 +11}. {1520701200 28800 0 +08}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):312
                                                                                      Entropy (8bit):4.290371654524798
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52L0DTm2OHlFFpwz0/MVSYv/JFFv7VoX/MVSYv/bpVQSbRXhNXSMVSYvx:MBp52LeTmdHfFCjF/LFvOkF/bp6SbRRT
                                                                                      MD5:780DA74192C8F569B1450AACE54A0558
                                                                                      SHA1:F2650D6D21A4B4AC8D931383ED343CE916252319
                                                                                      SHA-256:88A4DBB222E9FD2FFC26D9B5A8657FA6552DF6B3B6A14D951CE1168B5646E8F8
                                                                                      SHA-512:7F1E9E5C0F8E2A9D8AC68E19AF3D48D2BEE9840812A219A759475E7D036EA18CB122C40DDB88977079C1831AEF7EFBCB519C691616631D490B3C04382EB993C0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Davis) {. {-9223372036854775808 0 0 -00}. {-409190400 25200 0 +07}. {-163062000 0 0 -00}. {-28857600 25200 0 +07}. {1255806000 18000 0 +05}. {1268251200 25200 0 +07}. {1319742000 18000 0 +05}. {1329854400 25200 0 +07}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):206
                                                                                      Entropy (8bit):4.716730745171491
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52L0/3Om2OHlFFbRX82+c6FFpJ6SpQ:MBp52LdmdHfFbx82+ZFDQ
                                                                                      MD5:83B53540FADB1A36903E2A619954BFFC
                                                                                      SHA1:C9F520043A641104F43FB5422971B4D7A39A421C
                                                                                      SHA-256:0E50BA70DE94E6BABC4847C15865867D0F821F6BDDDC0B9750CB6BF13EF5DF3B
                                                                                      SHA-512:0AE7FE58EED7EAC03CBFFA2EA32CCBF726DBED0A3B1C20CF1D549CDA801CEB2B54F106787BD15B17DA3D9404E2D84936D50E4A2F63D1A72B0FEBCD8F8EA3195F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/DumontDUrville) {. {-9223372036854775808 0 0 -00}. {-725846400 36000 0 +10}. {-566992800 0 0 -00}. {-415497600 36000 0 +10}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2800
                                                                                      Entropy (8bit):3.8632793034261463
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQbTetvk4z/7hLiVVitCinq+D18KmvLx0WWuyymPXObf78FCt7WQi2NjM:5sTlKiG+h5mjKIyym+WQNo
                                                                                      MD5:A3E1A9DFB6D6F061E60739865E6E0D18
                                                                                      SHA1:10C014CB444DEEF093854EE6A415DC17D7C2A4C5
                                                                                      SHA-256:975026D38C4BF136769D31215F2908867EC37E568380F864983DD57FFADA4676
                                                                                      SHA-512:9425CF1B717FBDFD4EA04AAC06CF5ACE365A4FCC911D85130B910D022ED4261F1FFF431CE63BA538871C7D3CA1EF65490A30BEE975884EB39FC1E5C2D88009D0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Macquarie) {. {-9223372036854775808 0 0 -00}. {-2214259200 36000 0 AEST}. {-1680508800 39600 1 AEDT}. {-1669892400 39600 0 AEDT}. {-1665392400 36000 0 AEST}. {-1601719200 0 0 -00}. {-94730400 36000 0 AEST}. {-71136000 39600 1 AEDT}. {-55411200 36000 0 AEST}. {-37267200 39600 1 AEDT}. {-25776000 36000 0 AEST}. {-5817600 39600 1 AEDT}. {5673600 36000 0 AEST}. {25632000 39600 1 AEDT}. {37728000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226425600 36000 0 AEST}. {246988800 39600 1 AEDT}. {257875200 36000 0 AEST}. {278438400 39600 1 AEDT}. {289324800 36000 0 AEST}. {309888000 39
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.6965808819415695
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52L0GRHEzyedFkXGm2OHvdFFoVU/VPKVVFSTGFFFjsvUX0VQL:SlSWB9X52L0zyEm2OHlFFzy/UiF/js/G
                                                                                      MD5:A07C6FA0B635EC81C5199F2515888C9E
                                                                                      SHA1:587AC900E285F6298A7287F10466DFA4683B9A87
                                                                                      SHA-256:2D8F0218800F6E0BD645A7270BEAF60A517AE20CBFFD64CF77E3CE4F8F959348
                                                                                      SHA-512:76A3590748F698E51BF29A1D3C119A253A8C07E9F77835CCDFC6AC51C554B5888351C95E6012CDADB106B42A384D49E56537FBF8DB9DC5BB791CB115FDB623FD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Mawson) {. {-9223372036854775808 0 0 -00}. {-501206400 21600 0 +06}. {1255809600 18000 0 +05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):190
                                                                                      Entropy (8bit):4.832254042797831
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG/u4pVAIgObT/NCxL2L0GRHEz6BVfnUDH/uvn:SlSWB9IZaM3ycqIVAIgOboL2L0z6/fvn
                                                                                      MD5:0048A7427AC7880B9F6413208B216BC9
                                                                                      SHA1:CBB4A29316581CFC7868A779E97DB94F75870F41
                                                                                      SHA-256:487D4845885643700B4FF043AC5EA59E2355FD38357809BE12679ECAFFA93030
                                                                                      SHA-512:EC107FA59203B7BCB58253E2715380EF70DF5470030B83E1DEA8D1AC4E7D3FB2908E8C7009D8136212871EC3DA8B4C4194FF3290E5A41EEE8E7D07CABE80ECC0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Auckland)]} {. LoadTimeZoneFile Pacific/Auckland.}.set TZData(:Antarctica/McMurdo) $TZData(:Pacific/Auckland).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2526
                                                                                      Entropy (8bit):3.514598338545733
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5wcS+SGwRShoSdXvuMSuSYSgS1SWFlSqSySSSoyZSWXSHS9SWS3SbSRSBSUS5ShG:tNURMo8XvuMRnHqhTxxJAHXEa9c0yq/4
                                                                                      MD5:7738686109BCC8AF5271608FCD04EBFB
                                                                                      SHA1:401217F0F69945ADA13F593681D8F13A368BCF94
                                                                                      SHA-256:3EECDA7E4507A321A03171658187D2F50F7C6C46E8A1B0831E6B6B6AAFFAC4AC
                                                                                      SHA-512:F7982BF9D82B2D7C2C1825AF1FF9178849BB699A50367872C11572E6F8A452619A63C9F97CEAF06FD5104075FBDE70936B8363B993F2571FD9A2B699A1D17521
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Palmer) {. {-9223372036854775808 0 0 -00}. {-157766400 -14400 0 -04}. {-152654400 -14400 0 -04}. {-132955200 -10800 1 -04}. {-121122000 -14400 0 -04}. {-101419200 -10800 1 -04}. {-86821200 -14400 0 -04}. {-71092800 -10800 1 -04}. {-54766800 -14400 0 -04}. {-39038400 -10800 1 -04}. {-23317200 -14400 0 -04}. {-7588800 -10800 0 -03}. {128142000 -7200 1 -03}. {136605600 -10800 0 -03}. {389070000 -14400 0 -04}. {403070400 -10800 1 -04}. {416372400 -14400 0 -04}. {434520000 -10800 1 -04}. {447822000 -14400 0 -04}. {466574400 -10800 1 -04}. {479271600 -14400 0 -04}. {498024000 -10800 1 -04}. {510721200 -14400 0 -04}. {529473600 -10800 1 -04}. {545194800 -14400 0 -04}. {560923200 -10800 1 -04}. {574225200 -14400 0 -04}. {592372800 -10800 1 -04}. {605674800 -14400 0 -04}. {624427200 -10800 1 -04}. {637124400 -14400 0 -04}. {653457600
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):145
                                                                                      Entropy (8bit):4.778784990010973
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52L0GRHEsKRaXGm2OHvdFFn/H3VVFVGHC:SlSWB9X52L0rRhm2OHlFFn/VVFAHC
                                                                                      MD5:8CAED0DB4C911E84AF29910478D0DBD6
                                                                                      SHA1:80DE97C9959D58C6BF782A948EED735AB4C423CC
                                                                                      SHA-256:9415FA3A573B98A6EBCBFAEEC15B1C52352F2574161648BB977F55072414002F
                                                                                      SHA-512:28F27F7EDDF30EB08F8B37ED13219501D14D2AEA4EFA07AFAD36A643BD448E1BD992463C12C47152C99772D755E6EA0198B51B806A05B57743635A9059676EC2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Rothera) {. {-9223372036854775808 0 0 -00}. {218246400 -10800 0 -03}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):193
                                                                                      Entropy (8bit):4.858829912809126
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3ycqIVAIgOboL2L0tlo+plvn:MBaIMdQiO2LMq+p1
                                                                                      MD5:51AC23110E7EAB20319EE8EC82F048D2
                                                                                      SHA1:7B4DE168A3078041841762F468AE65A2EE6C5322
                                                                                      SHA-256:D33E094979B3CE495BEF7109D78F7B77D470AB848E4E2951851A7C57140354BF
                                                                                      SHA-512:13E800DFFA3D65F94FAD6B529FC8A29A26F40F4F29DBF19283392733458AD3C6B27E479218A8C123424E965711B4746976E39EB9FD54CD0B57281134FEAC4F31
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Auckland)]} {. LoadTimeZoneFile Pacific/Auckland.}.set TZData(:Antarctica/South_Pole) $TZData(:Pacific/Auckland).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):143
                                                                                      Entropy (8bit):4.7487926695696006
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52L0GRHEtWlFeEXGm2OHvdFFpoMdsWYAvn:SlSWB9X52L0tQeLm2OHlFFpbaWYAv
                                                                                      MD5:AA415901BB9E53CF7FAEA47E546D9AED
                                                                                      SHA1:CF12572D2C4D0ABF12B0450D366944E297744217
                                                                                      SHA-256:F161CFAB3E40A0358FF0DEC2EB8ED9231D357FAC20710668B9CE31CDA68E8B96
                                                                                      SHA-512:4F90E0EA7086EB729080E77A47C2E998F7AD3BCEA4997DAB06044BCDD2E2E1729A83C679EF2E1D78CD0255C37F24FCC6746518444CC4E96EBB2A0547312D8354
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Syowa) {. {-9223372036854775808 0 0 -00}. {-407808000 10800 0 +03}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5174
                                                                                      Entropy (8bit):3.411985404081831
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:q4NUwVb0uJjeH7wZjFH7EPzOLrNrnw/ZklmhEJkJdG:jNUwVAuJjs8JmPzO5ngzG
                                                                                      MD5:CA4730C864AB3CC903F79BDF0F9E8777
                                                                                      SHA1:7B3E9DDB36766F95F9C651CF244EDA9ED22BDDC5
                                                                                      SHA-256:E437539A85E91AD95CD100F9628142FEBB455553C95415DB1147FD25948EBF59
                                                                                      SHA-512:32EE0CCA0AB92D68D6C21A925E5367730A172C49DC5245A61DA1A39E08317569154C52EC695E3FB43BB40D066C4C0E9625C835A7F6E2EB5DDF0768D48DB99F3C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Troll) {. {-9223372036854775808 0 0 -00}. {1108166400 0 0 +00}. {1111885200 7200 1 +02}. {1130634000 0 0 +00}. {1143334800 7200 1 +02}. {1162083600 0 0 +00}. {1174784400 7200 1 +02}. {1193533200 0 0 +00}. {1206838800 7200 1 +02}. {1224982800 0 0 +00}. {1238288400 7200 1 +02}. {1256432400 0 0 +00}. {1269738000 7200 1 +02}. {1288486800 0 0 +00}. {1301187600 7200 1 +02}. {1319936400 0 0 +00}. {1332637200 7200 1 +02}. {1351386000 0 0 +00}. {1364691600 7200 1 +02}. {1382835600 0 0 +00}. {1396141200 7200 1 +02}. {1414285200 0 0 +00}. {1427590800 7200 1 +02}. {1445734800 0 0 +00}. {1459040400 7200 1 +02}. {1477789200 0 0 +00}. {1490490000 7200 1 +02}. {1509238800 0 0 +00}. {1521939600 7200 1 +02}. {1540688400 0 0 +00}. {1553994000 7200 1 +02}. {1572138000 0 0 +00}. {1585443600 7200 1 +02}. {1603587600 0 0 +00}. {1616893200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):144
                                                                                      Entropy (8bit):4.773942010845718
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52L0GRHEoKcMFtXGm2OHvdFFud/bVFXKVVFSTL:SlSWB9X52L0XcMFEm2OHlFFCVFXK/Un
                                                                                      MD5:A07C4769267AFA9501BE44BD406ADA34
                                                                                      SHA1:86747047EFD1F47FEFC7DA44465EAB53F808C9FB
                                                                                      SHA-256:92816E1C4FDE037D982596610A1F6E11D4E7FD408C3B1FAAB7BEC32B09911FE7
                                                                                      SHA-512:051A327C898867228C8B1848162C2604BED8456B61533D4A40FBEB9A0069AE2EAF33F79803A0C6A80C6446C34F757A751F4ABC5AC5CCED6C125E2A42D46A022A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Antarctica/Vostok) {. {-9223372036854775808 0 0 -00}. {-380073600 21600 0 +06}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):176
                                                                                      Entropy (8bit):4.922114908130109
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVyWJooedVAIgoqxWJ0YF2XbeLo4cA4FH/h8QasWJ/n:SlSWB9IZaM3ymSDdVAIgo2Q2XbUyAK8H
                                                                                      MD5:0F69284483D337DC8202970461A28386
                                                                                      SHA1:0D4592B8EBE070119CB3308534FE9A07A758F309
                                                                                      SHA-256:3A5DB7C2C71F95C495D0884001F82599E794118452E2748E95A7565523546A8E
                                                                                      SHA-512:D9F2618B153BFE4888E893A62128BE0BD59DFAFC824DA629454D5D541A9789536AC029BF73B6E9749409C522F450D53A270D302B2CF084444EA64D9138D77DFE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Oslo)]} {. LoadTimeZoneFile Europe/Oslo.}.set TZData(:Arctic/Longyearbyen) $TZData(:Europe/Oslo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):166
                                                                                      Entropy (8bit):4.7788335911117095
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8t1zVAIgNsM1E2WFK4h4WFK81S:SlSWB9IZaM3yN1zVAIgaM1E2wKs4wK8c
                                                                                      MD5:BBAFEA8E55A739C72E69A619C406BD5D
                                                                                      SHA1:0C2793114CA716C5DBAF081083DF1E137F1D0A63
                                                                                      SHA-256:6E69C5C3C3E1C98F24F5F523EC666B82534C9F33132A93CCC1100F27E594027F
                                                                                      SHA-512:7741F2281FDCA8F01A75ABEBF908F0B70320C4C026D90D4B0C283F3E2B8C47C95263569916EF83CAD40C87D5B6E714045D0B43370A263BC7BE80EC3DA62CC82F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Riyadh)]} {. LoadTimeZoneFile Asia/Riyadh.}.set TZData(:Asia/Aden) $TZData(:Asia/Riyadh).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1580
                                                                                      Entropy (8bit):3.640808791765599
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQveh8mSsOXEFCMiq90DIgb5j6gMJR/4TJTXSATo6SSsMuRFnCYRluoCC1Q0cxfw:50Fqq9iTVrXjS0qBsW
                                                                                      MD5:AC511C65052CE2D780FD583E50CB475C
                                                                                      SHA1:6B9171A13F6E6F33F878A347173A03112BCF1B89
                                                                                      SHA-256:C9739892527CCEBDF91D7E22A6FCD0FD57AAFA6A1B4535915AC82CF6F72F34A4
                                                                                      SHA-512:12743486EB02C241C90ECCEDD323D0F560D5FA1F55CB3EBB5AF3A65331D362433F2EAF7285B19335F5C262DA033EB8BE5A4618794EA74DFCD4107C170035CE96
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Almaty) {. {-9223372036854775808 18468 0 LMT}. {-1441170468 18000 0 +05}. {-1247547600 21600 0 +06}. {354909600 25200 1 +06}. {370717200 21600 0 +06}. {386445600 25200 1 +06}. {402253200 21600 0 +06}. {417981600 25200 1 +06}. {433789200 21600 0 +06}. {449604000 25200 1 +06}. {465336000 21600 0 +06}. {481060800 25200 1 +06}. {496785600 21600 0 +06}. {512510400 25200 1 +06}. {528235200 21600 0 +06}. {543960000 25200 1 +06}. {559684800 21600 0 +06}. {575409600 25200 1 +06}. {591134400 21600 0 +06}. {606859200 25200 1 +06}. {622584000 21600 0 +06}. {638308800 25200 1 +06}. {654638400 21600 0 +06}. {670363200 18000 0 +05}. {670366800 21600 1 +05}. {686091600 18000 0 +05}. {695768400 21600 0 +06}. {701812800 25200 1 +06}. {717537600 21600 0 +06}. {733262400 25200 1 +06}. {748987200 21600 0 +06}. {764712000 25200 1 +06}. {780436800 21
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7055
                                                                                      Entropy (8bit):3.621680472512772
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:Rnv8A4XkyKfUN9QXCkFpej4g2uMekzdgyvwKVuKEZhfuITrar2gsq0teU:RvMw2y3p+4g2PxbLS5
                                                                                      MD5:703F8A37D41186AC8CDBCB86B9FE6C1B
                                                                                      SHA1:B2D7FCBD290DA0FEB31CD310BA29FE27A59822BE
                                                                                      SHA-256:847FA8211956C5930930E2D7E760B1D7F551E8CDF99817DB630222C960069EB8
                                                                                      SHA-512:66504E448469D2358C228966739F0FEB381BF862866A951B092A600A17DAD80E6331F6D88C4CFCE483F45E79451722A19B37291EDA75C7CD4D7E0A7E82096F47
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Amman) {. {-9223372036854775808 8624 0 LMT}. {-1230776624 7200 0 EET}. {108165600 10800 1 EEST}. {118270800 7200 0 EET}. {136591200 10800 1 EEST}. {149806800 7200 0 EET}. {168127200 10800 1 EEST}. {181342800 7200 0 EET}. {199749600 10800 1 EEST}. {215643600 7200 0 EET}. {231285600 10800 1 EEST}. {244501200 7200 0 EET}. {262735200 10800 1 EEST}. {275950800 7200 0 EET}. {481154400 10800 1 EEST}. {496962000 7200 0 EET}. {512949600 10800 1 EEST}. {528670800 7200 0 EET}. {544399200 10800 1 EEST}. {560120400 7200 0 EET}. {575848800 10800 1 EEST}. {592174800 7200 0 EET}. {610581600 10800 1 EEST}. {623624400 7200 0 EET}. {641167200 10800 1 EEST}. {655074000 7200 0 EET}. {671839200 10800 1 EEST}. {685918800 7200 0 EET}. {702856800 10800 1 EEST}. {717973200 7200 0 EET}. {733701600 10800 1 EEST}. {749422800 7200 0 EET}. {765151200 10800 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2014
                                                                                      Entropy (8bit):3.680306971172711
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQMe/VrghhF87/Fpd2kNNxLcULBQdHl2yYvpQ62itgUiRrn5d6kGFF6UERWkBUHA:5ah2zFvpchKvW62XPdXJMwT3Lea
                                                                                      MD5:E0396BBBB3FDDD2B651D2DBB4EF90884
                                                                                      SHA1:C1FFCDC6EB77B5F4CFAFA90EA8E1025DB142D5C5
                                                                                      SHA-256:6A9B4EF8FBED758E8D1737C79D803F9DF4F5BF61F115064ED60DA2397B88FE19
                                                                                      SHA-512:8FB6D19189142F11812B82F5803F4E5C85BF107689D317305D32EF71905DC9E0655DD2F2D4CE234B5872A6BF452670221F94EF1D48EF776C002AA5A484C2481B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Anadyr) {. {-9223372036854775808 42596 0 LMT}. {-1441194596 43200 0 +12}. {-1247572800 46800 0 +14}. {354884400 50400 1 +14}. {370692000 46800 0 +13}. {386420400 43200 0 +13}. {386424000 46800 1 +13}. {402231600 43200 0 +12}. {417960000 46800 1 +13}. {433767600 43200 0 +12}. {449582400 46800 1 +13}. {465314400 43200 0 +12}. {481039200 46800 1 +13}. {496764000 43200 0 +12}. {512488800 46800 1 +13}. {528213600 43200 0 +12}. {543938400 46800 1 +13}. {559663200 43200 0 +12}. {575388000 46800 1 +13}. {591112800 43200 0 +12}. {606837600 46800 1 +13}. {622562400 43200 0 +12}. {638287200 46800 1 +13}. {654616800 43200 0 +12}. {670341600 39600 0 +12}. {670345200 43200 1 +12}. {686070000 39600 0 +11}. {695746800 43200 0 +13}. {701791200 46800 1 +13}. {717516000 43200 0 +12}. {733240800 46800 1 +13}. {748965600 43200 0 +12}. {764690400 46
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1607
                                                                                      Entropy (8bit):3.623112789966889
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQJeoR9NSVYlS7hhmSQcwqSlhJS9yiIoSBHrSLUSIYdDS7/S5c3oSATo03CRJS2I:5fZlkhs7bqIwIoMpqDS7oXb0w+sRBlL
                                                                                      MD5:410226AA30925F31BA963139FD594AEB
                                                                                      SHA1:860E17C83D0DF2CBB4B8E73B9C7CB956994F5549
                                                                                      SHA-256:69402CA6D56138A6A6D09964B90D1781A7CBEFBDFFE506B7292758EC24740B0E
                                                                                      SHA-512:AE2610D1D779500132D5FA12E7529551ECD009848619C7D802F6EE89B0D2C3D6E7C91FB83DA7616180C166CE9C4499D7A2A4FEB5373621353640A71830B655A3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Aqtau) {. {-9223372036854775808 12064 0 LMT}. {-1441164064 14400 0 +04}. {-1247544000 18000 0 +05}. {370724400 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {695772000 18000 0 +05}. {701816400 21600 1 +05}. {717541200 18000 0 +05}. {733266000 21600 1 +05}. {748990800 18000 0 +05}. {764715600 21600 1 +05}. {780440400 180
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1608
                                                                                      Entropy (8bit):3.6301391279603696
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5FhXlkhs7bqIwIoMpqDS7oXb0w+bBijbbyzIr1jJL:PtCOgZbdp
                                                                                      MD5:B8D914F33D568AE8EB46B7F3FC5BF944
                                                                                      SHA1:91DE61EC025E8F74D9CD10816C3534B5F8D397F7
                                                                                      SHA-256:9C1C30ADD1919951350C86DA6B716326178CF74A849A3350AE147DD2ADC34049
                                                                                      SHA-512:A32B34C15D94C42E9DF13316ACB9E0C9AF151F2EF14F502BE1A75E40735A2BC5D9E59244A72ACFB68184DA0D62A48FCC7AB288F1BA85DBB4DC385FA04BF3075D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Aqtobe) {. {-9223372036854775808 13720 0 LMT}. {-1441165720 14400 0 +04}. {-1247544000 18000 0 +05}. {354913200 21600 1 +06}. {370720800 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {695772000 18000 0 +05}. {701816400 21600 1 +05}. {717541200 18000 0 +05}. {733266000 21600 1 +05}. {748990800 18000 0 +05}. {764715600 21
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):847
                                                                                      Entropy (8bit):3.852939540326754
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQgZeRHINS62DS7hhmSQcwqSlhJS9yiIoSBHrSLUSIYdDS7/S5c3oSATo03CRJL:5g8U0khs7bqIwIoMpqDS7oXb0L
                                                                                      MD5:BFDAC4AE48AD49E5C0A048234586507E
                                                                                      SHA1:ACFE49AED50D0FDF2978034BB3098331F6266CC8
                                                                                      SHA-256:77FB5A9F578E75EEC3E3B83618C99F33A04C19C8BB9AFB314888091A8DD64AA3
                                                                                      SHA-512:11B412E0856BD384080B982C9DE6CE196E8C71A68096F7ED22972B7617533F9BD92EFA4C153F2CEE7EA4F0DE206281B6B9066C5969AFFE913AF2FA5CF82EDD90
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Ashgabat) {. {-9223372036854775808 14012 0 LMT}. {-1441166012 14400 0 +04}. {-1247544000 18000 0 +05}. {354913200 21600 1 +05}. {370720800 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {695772000 18000 0 +05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):177
                                                                                      Entropy (8bit):4.750782589043179
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8xEYM4DdVAIgN/ZEYvCHt2WFKUNSH+WFKYEYMvn:SlSWB9IZaM3yRhVAIgH1CHt2wKUNSewa
                                                                                      MD5:73E1F618FB430C503A1499E3A0298C97
                                                                                      SHA1:29F31A7C9992F9D9B3447FCBC878F1AF8E4BD57F
                                                                                      SHA-256:5917FC603270C0470D2EC416E6C85E999A52B6A384A2E1C5CFC41B29ABCA963A
                                                                                      SHA-512:FAE39F158A4F47B4C37277A1DC77B8524DD4287EBAD5D8E6CBB906184E6DA275A308B55051114F4CD4908B449AE3C8FD48384271E3F7106801AD765E5958B4DD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Ashgabat)]} {. LoadTimeZoneFile Asia/Ashgabat.}.set TZData(:Asia/Ashkhabad) $TZData(:Asia/Ashgabat).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1608
                                                                                      Entropy (8bit):3.6351436957032477
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:55IZlkhs7bqIwIoMpqDS7oXb0w+bBijbbyblL:X8COgZbd4x
                                                                                      MD5:F2A86E76222B06103F6C1E8F89EB453E
                                                                                      SHA1:D73938EBCA8C1340A7C86E865492EE581DFFC393
                                                                                      SHA-256:211AB2318746486C356091EC2D3508D6FB79B9EBC78FC843BF2ADC96A38C4217
                                                                                      SHA-512:B5F4F8FF11FA6D113B23F60D64E1737C7FABDDEBF12C37138F0FA05254E6C1643A2D3CA6C322943F4E877CE2E3736CF0F0741DD390C79E7EE94D56361B14BF45
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Atyrau) {. {-9223372036854775808 12464 0 LMT}. {-1441164464 10800 0 +03}. {-1247540400 18000 0 +05}. {370724400 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {695772000 18000 0 +05}. {701816400 21600 1 +05}. {717541200 18000 0 +05}. {733266000 21600 1 +05}. {748990800 18000 0 +05}. {764715600 21600 1 +05}. {780440400 18
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1643
                                                                                      Entropy (8bit):3.6348723729667975
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQcTe0yZH76UtjUtUVmFbmU0cybUJN2cU2U9U56UJMlUoCUUbu/UTbU4UdTbU8U6:5cp6pLmFsyN2LouCIpYZgrCi
                                                                                      MD5:2C0422E86BA0AECAA97CA01F3A27B797
                                                                                      SHA1:C28FD8530B7895B4631EA0CAE03E6019561C4C40
                                                                                      SHA-256:D5D69D7A4FE29761C5C3FFBB41A4F8B6B5F2101A34678B1FA9B1D39FC5478EA8
                                                                                      SHA-512:3C346DE7E82B8EF1783F5A6D8A6099F7A530DD29AD48EDBB72F019ADC47155A703845503B1DD2589315BB67FA40AEF584313150686248DF45F983781F4B18710
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Baghdad) {. {-9223372036854775808 10660 0 LMT}. {-2524532260 10656 0 BMT}. {-1641005856 10800 0 +03}. {389048400 14400 0 +03}. {402264000 10800 0 +03}. {417906000 14400 1 +03}. {433800000 10800 0 +03}. {449614800 14400 1 +03}. {465422400 10800 0 +03}. {481150800 14400 1 +03}. {496792800 10800 0 +03}. {512517600 14400 1 +03}. {528242400 10800 0 +03}. {543967200 14400 1 +03}. {559692000 10800 0 +03}. {575416800 14400 1 +03}. {591141600 10800 0 +03}. {606866400 14400 1 +03}. {622591200 10800 0 +03}. {638316000 14400 1 +03}. {654645600 10800 0 +03}. {670464000 14400 1 +03}. {686275200 10800 0 +03}. {702086400 14400 1 +03}. {717897600 10800 0 +03}. {733622400 14400 1 +03}. {749433600 10800 0 +03}. {765158400 14400 1 +03}. {780969600 10800 0 +03}. {796694400 14400 1 +03}. {812505600 10800 0 +03}. {828316800 14400 1 +03}. {844128000 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):166
                                                                                      Entropy (8bit):4.732157428331905
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8hHVAIgNvZAvxL2WFKENUKMFB/4WFKKu:SlSWB9IZaM3yBHVAIgPAvxL2wKENUr/i
                                                                                      MD5:6291D60E3A30B76FEB491CB944BC2003
                                                                                      SHA1:3D31032CF518A712FBA49DEC42FF3D99DD468140
                                                                                      SHA-256:A462F83DDB0CCC41AC10E0B5B98287B4D89DA8BBBCA869CCFB81979C70613C6C
                                                                                      SHA-512:C62D44527EAD47D2281FF951B9CF84C297859CFDC9A497CB92A583B6012B2B9DAAE9924EF17BC6B7CD317B770FF4924D8E1E77ED2E0EBC02502530D132EDE35B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Qatar)]} {. LoadTimeZoneFile Asia/Qatar.}.set TZData(:Asia/Bahrain) $TZData(:Asia/Qatar).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2075
                                                                                      Entropy (8bit):3.5206282649651808
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQ4ekZqpkb/cXXn8UDu5u8WmFeb/RLc9qENkw/ybt8i9E60339UyuU+DTO1KKlYX:5YTVOZmF7N76eHIAMsiWVyv2Te
                                                                                      MD5:460EDC7D17FFA6AF834B6474D8262FB0
                                                                                      SHA1:913E117814A5B4B7283A533F47525C8A0C68FD3C
                                                                                      SHA-256:0A1FDA259EE5EBC779768BBADACC7E1CCAC56484AA6C03F7C1F79647AB79593D
                                                                                      SHA-512:4047A7AD5F248F0B304FEF06C73EA655D603C39B6AC74629A2ADD49A93E74B23F458DC70E8150AD3F5BBF773F2387907B4BB69A95EB945B9FA432CA6B8AB173D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Baku) {. {-9223372036854775808 11964 0 LMT}. {-1441163964 10800 0 +03}. {-405140400 14400 0 +04}. {354916800 18000 1 +04}. {370724400 14400 0 +04}. {386452800 18000 1 +04}. {402260400 14400 0 +04}. {417988800 18000 1 +04}. {433796400 14400 0 +04}. {449611200 18000 1 +04}. {465343200 14400 0 +04}. {481068000 18000 1 +04}. {496792800 14400 0 +04}. {512517600 18000 1 +04}. {528242400 14400 0 +04}. {543967200 18000 1 +04}. {559692000 14400 0 +04}. {575416800 18000 1 +04}. {591141600 14400 0 +04}. {606866400 18000 1 +04}. {622591200 14400 0 +04}. {638316000 18000 1 +04}. {654645600 14400 0 +04}. {670370400 10800 0 +03}. {670374000 14400 1 +03}. {686098800 10800 0 +03}. {701823600 14400 1 +03}. {717548400 14400 0 +04}. {820440000 14400 0 +04}. {828234000 18000 1 +05}. {846378000 14400 0 +04}. {852062400 14400 0 +04}. {859680000 18000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):174
                                                                                      Entropy (8bit):4.863210418273511
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52WFKELYOUXGm2OHB+kevXZKmrROpDvFFsQ+8EXVeVSYvC:SlSWB9X52wKELPm2OHxePZ3FO1Rb+UVe
                                                                                      MD5:8291C9916E9D5E5C78DE38257798799D
                                                                                      SHA1:F67A474337CF5FF8460911C7003930455AA0C530
                                                                                      SHA-256:ED9D1C47D50461D312C7314D5C1403703E29EE14E6BAC97625EFB06F38E4942C
                                                                                      SHA-512:9B552812A0001271980F87C270EF4149201403B911826BDF17F66EE1015B9AC859C1B2E7BB4EB6BC56E37CDB24097BF001201C34AD7D4C0C910AE17CFEC36C8B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Bangkok) {. {-9223372036854775808 24124 0 LMT}. {-2840164924 24124 0 BMT}. {-1570084924 25200 0 +07}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2044
                                                                                      Entropy (8bit):3.6106776173203916
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5Mi17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7FfiC/L7UVtrBju6waUwcTLTTg:9jFRRCfQuiB7TQZ
                                                                                      MD5:DC7A71DAB17C7F4A348DC1EE2FC458C5
                                                                                      SHA1:982FAB93A637D18A049DDBE96B0341736C66561D
                                                                                      SHA-256:52DB3278189AA2380D84A81199A2E7F3B40E9706228D2291C6257FD513D78667
                                                                                      SHA-512:90659D37D2A2E8574A88FD7F222C28D9572A9866FC3459B0CC1760FECBC7C4A0574B224C252877D723B06DD72165C4FE368D5B00DAB662B85D2E0F4CB2A89271
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Barnaul) {. {-9223372036854775808 20100 0 LMT}. {-1579844100 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {748983600 25200 0 +07}. {764708400 28800 1 +08}. {780433200 2
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7754
                                                                                      Entropy (8bit):3.6329631010207892
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:OnQv8iPC28v82K/w1VxDmsCZgV+f7dIWDkLDo1WlqCTpXxcKvjRQZwtPEWRTvS4y:OQjPCL5VxKWC7dIWDkLDoqphsX
                                                                                      MD5:2D3AE4AD36BD5F302F980EB5F1DD0E4A
                                                                                      SHA1:02244056D6D4EC57937D1E187CC65E8FD18F67F0
                                                                                      SHA-256:E9DD371FA47F8EF1BE04109F0FD3EBD9FC5E2B0A12C0630CDD20099C838CBEBB
                                                                                      SHA-512:2E4528254102210B8A9A2263A8A8E72774D40F57C2431C2DD6B1761CD91FB6CEA1FAD23877E1E2D86217609882F3605D7FE477B771A398F91F8D8AD3EAF90BAC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Beirut) {. {-9223372036854775808 8520 0 LMT}. {-2840149320 7200 0 EET}. {-1570413600 10800 1 EEST}. {-1552186800 7200 0 EET}. {-1538359200 10800 1 EEST}. {-1522551600 7200 0 EET}. {-1507514400 10800 1 EEST}. {-1490583600 7200 0 EET}. {-1473645600 10800 1 EEST}. {-1460948400 7200 0 EET}. {-399866400 10800 1 EEST}. {-386650800 7200 0 EET}. {-368330400 10800 1 EEST}. {-355114800 7200 0 EET}. {-336794400 10800 1 EEST}. {-323578800 7200 0 EET}. {-305172000 10800 1 EEST}. {-291956400 7200 0 EET}. {-273636000 10800 1 EEST}. {-260420400 7200 0 EET}. {78012000 10800 1 EEST}. {86734800 7200 0 EET}. {105055200 10800 1 EEST}. {118270800 7200 0 EET}. {136591200 10800 1 EEST}. {149806800 7200 0 EET}. {168127200 10800 1 EEST}. {181342800 7200 0 EET}. {199749600 10800 1 EEST}. {212965200 7200 0 EET}. {231285600 10800 1 EEST}. {244501200 7200 0 EE
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1611
                                                                                      Entropy (8bit):3.653654369590701
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQge4/SsOXEFCMiq90DIgb5j6gMJR/4TJTXSATolS+WSP7VSzlBSkhFSblDSDOQy:5qFqq9iTVrX2ioerAYabcivcnXKh
                                                                                      MD5:1A3A4825B73F11024FD21F94AE85F9D2
                                                                                      SHA1:E63443CC267B43EFEFFD1E3161293217526E7DC8
                                                                                      SHA-256:D8205F34BB8B618E2F8B4EB6E613BE1B5CFBBF3B6CBFAFE868644E1A1648C164
                                                                                      SHA-512:5C766BD6FB6195BEBD7CDF703B7E0A67FBB2BCF98052866AE9ACDC5B90469421508F52C60F22542BBA6ED8CC59B4889F20DB131B183918592139B6D135BC57A2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Bishkek) {. {-9223372036854775808 17904 0 LMT}. {-1441169904 18000 0 +05}. {-1247547600 21600 0 +06}. {354909600 25200 1 +06}. {370717200 21600 0 +06}. {386445600 25200 1 +06}. {402253200 21600 0 +06}. {417981600 25200 1 +06}. {433789200 21600 0 +06}. {449604000 25200 1 +06}. {465336000 21600 0 +06}. {481060800 25200 1 +06}. {496785600 21600 0 +06}. {512510400 25200 1 +06}. {528235200 21600 0 +06}. {543960000 25200 1 +06}. {559684800 21600 0 +06}. {575409600 25200 1 +06}. {591134400 21600 0 +06}. {606859200 25200 1 +06}. {622584000 21600 0 +06}. {638308800 25200 1 +06}. {654638400 21600 0 +06}. {670363200 18000 0 +05}. {670366800 21600 1 +05}. {683586000 18000 0 +05}. {703018800 21600 1 +05}. {717530400 18000 0 +05}. {734468400 21600 1 +05}. {748980000 18000 0 +05}. {765918000 21600 1 +05}. {780429600 18000 0 +05}. {797367600 2
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):175
                                                                                      Entropy (8bit):4.792958708451203
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52WFKXeAMMkEXGm2OHCQdvVVvUWUOVFW/FvOVSSC/FiUMWfV1S:SlSWB9X52wK0bm2OHCIvVVXUuW/MVSSV
                                                                                      MD5:95EE0EFC01271C3E3195ADC360F832C7
                                                                                      SHA1:CDFA243F359AC5D2FA22032BF296169C8B2B942A
                                                                                      SHA-256:241C47769C689823961D308B38D8282F6852BC0511E7DC196BF6BF4CFADBE401
                                                                                      SHA-512:11CAE9804EF933A790F5B9B86CC03C133DBD1DB97FAA78F508D681662AAC3714B93166B596F248799FC5B86344B48764865D3371427119999CB02963C98E15C3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Brunei) {. {-9223372036854775808 27580 0 LMT}. {-1383464380 27000 0 +0730}. {-1167636600 28800 0 +08}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.721946029615065
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq864DdVAIgN1EF2WFKh0s+WFKvvn:SlSWB9IZaM3ya4DdVAIgo2wKN+wKvv
                                                                                      MD5:A967F010A398CD98871E1FF97F3E48AC
                                                                                      SHA1:6C8C0AF614D6789CD1F9B6243D26FAC1F9B767EF
                                                                                      SHA-256:B07250CD907CA11FE1C94F1DCCC999CECF8E9969F74442A9FCC00FC48EDE468B
                                                                                      SHA-512:67E3207C8A63A5D8A1B7ED1A62D57639D695F9CD83126EB58A70EF076B816EC5C4FDBD23F1F32A4BB6F0F9131D30AF16B56CD92B1C42C240FD886C81BA8940DA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Kolkata)]} {. LoadTimeZoneFile Asia/Kolkata.}.set TZData(:Asia/Calcutta) $TZData(:Asia/Kolkata).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2014
                                                                                      Entropy (8bit):3.6060921590827193
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQyeCXQS6oziDpiKXtyiyzilUBinUijiRziiiaSiYzYWk2HgQiMhNIziPiRikiAF:5c/9InX4n7m84nPIzOtfjQhGTNw
                                                                                      MD5:A3FB98DC18AC53AE13337F3CC1C4CE68
                                                                                      SHA1:F0280D5598AEB6B6851A8C2831D4370E27121B5F
                                                                                      SHA-256:D0A984F2EDB6A5A4E3C3CFA812550782F6B34AD0C79B1DD742712EBA14B7B9FB
                                                                                      SHA-512:A33E2E0EA093BB758539A761B4CF82204699BC35950ACD329DA9205A141469930CAF179E4331DF505408C7C4F97480416DC16C7E93E53B12392509E5A093E562
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Chita) {. {-9223372036854775808 27232 0 LMT}. {-1579419232 28800 0 +08}. {-1247558400 32400 0 +10}. {354898800 36000 1 +10}. {370706400 32400 0 +09}. {386434800 36000 1 +10}. {402242400 32400 0 +09}. {417970800 36000 1 +10}. {433778400 32400 0 +09}. {449593200 36000 1 +10}. {465325200 32400 0 +09}. {481050000 36000 1 +10}. {496774800 32400 0 +09}. {512499600 36000 1 +10}. {528224400 32400 0 +09}. {543949200 36000 1 +10}. {559674000 32400 0 +09}. {575398800 36000 1 +10}. {591123600 32400 0 +09}. {606848400 36000 1 +10}. {622573200 32400 0 +09}. {638298000 36000 1 +10}. {654627600 32400 0 +09}. {670352400 28800 0 +09}. {670356000 32400 1 +09}. {686080800 28800 0 +08}. {695757600 32400 0 +10}. {701802000 36000 1 +10}. {717526800 32400 0 +09}. {733251600 36000 1 +10}. {748976400 32400 0 +09}. {764701200 36000 1 +10}. {780426000 324
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1563
                                                                                      Entropy (8bit):3.6863846285633057
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQtZeCjXN1xJq4tyiIHil++lqivEoziHvqil+fiRBiS/BvWjiY2Vizi6Xi4+k8ih:5tFdXJVHpkbvvWr2sv5kPYxwM3N5
                                                                                      MD5:799F0221A1834C723E6BBA2D00727156
                                                                                      SHA1:569BBC1F20F7157ECF753A8DEB49156B260A96E0
                                                                                      SHA-256:02FF47A619BE154A88530BA8C83F5D52277FA8E8F7941C0D33F89161CE1B5503
                                                                                      SHA-512:535812754A92E251A9C86C20E3032A6B363F77F6839C95DAD6ED18200ACAA3075E602AD626F50B84EB931D1D33BD0E00CA5AE1D1D95DEBECDE57EE9E65A137DF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Choibalsan) {. {-9223372036854775808 27480 0 LMT}. {-2032933080 25200 0 +07}. {252435600 28800 0 +08}. {417974400 36000 0 +09}. {433778400 32400 0 +09}. {449593200 36000 1 +09}. {465314400 32400 0 +09}. {481042800 36000 1 +09}. {496764000 32400 0 +09}. {512492400 36000 1 +09}. {528213600 32400 0 +09}. {543942000 36000 1 +09}. {559663200 32400 0 +09}. {575391600 36000 1 +09}. {591112800 32400 0 +09}. {606841200 36000 1 +09}. {622562400 32400 0 +09}. {638290800 36000 1 +09}. {654616800 32400 0 +09}. {670345200 36000 1 +09}. {686066400 32400 0 +09}. {701794800 36000 1 +09}. {717516000 32400 0 +09}. {733244400 36000 1 +09}. {748965600 32400 0 +09}. {764694000 36000 1 +09}. {780415200 32400 0 +09}. {796143600 36000 1 +09}. {811864800 32400 0 +09}. {828198000 36000 1 +09}. {843919200 32400 0 +09}. {859647600 36000 1 +09}. {875368800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):177
                                                                                      Entropy (8bit):4.815975603028152
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qvwVAIgNtA2WFKh2V7/4WFKdv:SlSWB9IZaM3yMwVAIgE2wKho4wKt
                                                                                      MD5:37D7B7C1E435E2539FDD83D71149DD9A
                                                                                      SHA1:F4ADE88DDF244BD2FF5B23714BF7449A74907E08
                                                                                      SHA-256:78611E8A0EBEBC4CA2A55611FAC1F00F8495CB044B2A6462214494C7D1F5DA6A
                                                                                      SHA-512:E0C57229DC76746C6424606E41E10E97F0F08DD2B00659172DA35F3444BF48B4BC7E2F339A10ECC21628A683E2CB8B4FA5945B8AC68C6BAFEA720AFBB88C90C6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Shanghai)]} {. LoadTimeZoneFile Asia/Shanghai.}.set TZData(:Asia/Chongqing) $TZData(:Asia/Shanghai).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):177
                                                                                      Entropy (8bit):4.840543487466552
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qvwVAIgNtA2WFK7LeL9J4WFKdv:SlSWB9IZaM3yMwVAIgE2wK7LUT4wKt
                                                                                      MD5:6F21100628DD48B2FF4B1F2AF92E05CB
                                                                                      SHA1:B74478D0EC95A577C2A58497692DB293BBD31586
                                                                                      SHA-256:DB2C572E039D1A777FFC66558E2BEE46C52D8FE57401436AE18BB4D5892131CE
                                                                                      SHA-512:2D3C37790B6A764FE4E1B8BD8EDF1D073D711F59CEA3EC5E6003E481898F7285B42A14E904C3D148422244BB083FBA42C6623DF7DA05923F6145EEE3FD259520
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Shanghai)]} {. LoadTimeZoneFile Asia/Shanghai.}.set TZData(:Asia/Chungking) $TZData(:Asia/Shanghai).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):356
                                                                                      Entropy (8bit):4.4006537789533695
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKr+tJm2OHgPZv9tGZjSWV/FSQRpPUrK/F/ND/k5iRVVFSQ9R/U4C/k:MBp52z+mdHgPZvqZj1NjDPh/F/1/Y4vF
                                                                                      MD5:4074FBEF7DD0DF48AD74BDAED3106A75
                                                                                      SHA1:FB1E5190EAF8BF9B64EED49F115E34926C1EAF53
                                                                                      SHA-256:DB6A7EA0DC757706126114BED5E693565938AABFE3DA1670170647CCDE6BE6CD
                                                                                      SHA-512:A469C09FA6A1DA1DB140BFFECB931DBC4B2315A13B82FCA8813C93954598D03818323B7DDE1106D1F1D815ED69523361369AF883CA4818CA562D728F7A88D8A7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Colombo) {. {-9223372036854775808 19164 0 LMT}. {-2840159964 19172 0 MMT}. {-2019705572 19800 0 +0530}. {-883287000 21600 1 +06}. {-862639200 23400 1 +0630}. {-764051400 19800 0 +0530}. {832962600 23400 0 +0630}. {846266400 21600 0 +06}. {1145039400 19800 0 +0530}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):164
                                                                                      Entropy (8bit):4.733855608307331
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8ntdVAIgN6Ko2WFK1S2WFKwu:SlSWB9IZaM3yHtdVAIgMKo2wKM2wKwu
                                                                                      MD5:629FC03B52D24615FB052C84B0F30452
                                                                                      SHA1:80D24B1A70FC568AB9C555BD1CC70C17571F6061
                                                                                      SHA-256:BD3E4EE002AFF8F84E74A6D53E08AF5B5F2CAF2B06C9E70B64B05FC8F0B6CA99
                                                                                      SHA-512:1C912A5F323E84A82D60300F6AC55892F870974D4DEFE0AF0B8F6A87867A176D3F8D66C1A5B11D8560F549D738FFE377DC20EB055182615062D4649BBA011F32
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Dhaka)]} {. LoadTimeZoneFile Asia/Dhaka.}.set TZData(:Asia/Dacca) $TZData(:Asia/Dhaka).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8031
                                                                                      Entropy (8bit):3.629699951300869
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:zY75F5VoNVIkbl3IUQZufk0Eej4YWuM0c5/61a7/VGfV8SbU5J3Mirmgs3LmiK:zI75KN+YlgYE+4YWPB6O4in9
                                                                                      MD5:202E5950F6324878B0E6FD0056D2F186
                                                                                      SHA1:A668D4DC3E73A292728CCE136EFFAC95D5952A81
                                                                                      SHA-256:3BB43B71FF807AA3BF6A7F94680FB8BD586A1471218307A6A7A4CE73A5A3A55E
                                                                                      SHA-512:5F9A7308E9C08267ECB8D502505EF9B32269D62FA490D6BC01F6927CB8D5B40CA17BB0CDFA3EE78D48C7686EAA7FD266666EB80E54125859F86CADFD7366DB6B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Damascus) {. {-9223372036854775808 8712 0 LMT}. {-1577931912 7200 0 EET}. {-1568592000 10800 1 EEST}. {-1554080400 7200 0 EET}. {-1537142400 10800 1 EEST}. {-1522630800 7200 0 EET}. {-1505692800 10800 1 EEST}. {-1491181200 7200 0 EET}. {-1474243200 10800 1 EEST}. {-1459126800 7200 0 EET}. {-242265600 10800 1 EEST}. {-228877200 7200 0 EET}. {-210556800 10800 1 EEST}. {-197427600 7200 0 EET}. {-178934400 10800 1 EEST}. {-165718800 7200 0 EET}. {-147398400 10800 1 EEST}. {-134269200 7200 0 EET}. {-116467200 10800 1 EEST}. {-102646800 7200 0 EET}. {-84326400 10800 1 EEST}. {-71110800 7200 0 EET}. {-52704000 10800 1 EEST}. {-39488400 7200 0 EET}. {-21168000 10800 1 EEST}. {-7952400 7200 0 EET}. {10368000 10800 1 EEST}. {23583600 7200 0 EET}. {41904000 10800 1 EEST}. {55119600 7200 0 EET}. {73526400 10800 1 EEST}. {86742000 7200 0 EET}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):351
                                                                                      Entropy (8bit):4.345019966462698
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKwfTm2OHEmVFnP9vX+H7UlckVVFSQRL/FG/UPy/UiF/ji/UiF/jWKO:MBp52YfTmdHzdP9P+bcvjRQmmF/j2F/8
                                                                                      MD5:F5A6B4C90D50208EF512A728A2A03BB6
                                                                                      SHA1:C9D3C712EDABDFCD1629E72AF363CEB2A0E2334E
                                                                                      SHA-256:42BF62F13C2F808BEFD2601D668AFE5D49EA417FC1AC5391631C20ED7225FF46
                                                                                      SHA-512:64D413D9299436877F287943FF454EB2AFD415D87DE13AACA50E7BD123828D16CFABD679677F36C891024AB53C62695559DAABDECCC127A669C3ECA0F155453B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Dhaka) {. {-9223372036854775808 21700 0 LMT}. {-2524543300 21200 0 HMT}. {-891582800 23400 0 +0630}. {-872058600 19800 0 +0530}. {-862637400 23400 0 +0630}. {-576138600 21600 0 +06}. {1230746400 21600 0 +06}. {1245430800 25200 1 +06}. {1262278800 21600 0 +06}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):226
                                                                                      Entropy (8bit):4.536797249025477
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKCXeLm2OHnBGeVmkNvyvScCVUkP1avScCC:MBp52qXEmdHnBvVDVyHCPP8HCC
                                                                                      MD5:54EC6A256F6D636CD98DD48CDF0E48F1
                                                                                      SHA1:571244C3D84A8A6EFFE55C787BFBCE7A6014462C
                                                                                      SHA-256:88D61A495724F72DA6AB20CC997575F27797589C7B80F2C63C27F84BF1EB8D61
                                                                                      SHA-512:EDD67865D3AD3D2F6D1AFFAE35B6B25E2439164E0BEF8E0E819F88F937F896C10EAB513467524DA0A5A2E3D4C78F55EA3F98F25979B8625DFC66801CBBE9301F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Dili) {. {-9223372036854775808 30140 0 LMT}. {-1830414140 28800 0 +08}. {-879152400 32400 0 +09}. {199897200 28800 0 +08}. {969120000 32400 0 +09}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):142
                                                                                      Entropy (8bit):4.927936359970315
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52WFKQiXGm2OHvkdvUQK23NVsRYvC:SlSWB9X52wKQZm2OHvsRVNSQC
                                                                                      MD5:6CC252314EDA586C514C76E6981EEAEE
                                                                                      SHA1:F58C9072FBBA31C735345162F629BB6CAAB9C871
                                                                                      SHA-256:8D7409EBC94A817962C3512E07AFF32838B54B939068129C73EBBEEF8F858ED2
                                                                                      SHA-512:40BC04B25F16247F9F6569A37D28EDCA1D7FB33586482A990A36B5B148BF7598CF5493D38C4D1CBDF664553302E4D6505D80EB7E7B5B9FB5141CB7F39B99A93D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Dubai) {. {-9223372036854775808 13272 0 LMT}. {-1577936472 14400 0 +04}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):791
                                                                                      Entropy (8bit):3.8859952964866946
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQJeOJSsOXEFCMiq90DIgb5j6gMJR/4TJTi4GDL:51Fqq9iTVuzL
                                                                                      MD5:316F527821D632517866A6E7F97365B3
                                                                                      SHA1:6F56985AF44E6533778CFB1FC04D206367A6C0BF
                                                                                      SHA-256:5A8FFD24FF0E26C99536EB9D3FB308C28B3491042034B187140039B7A5DF6F1F
                                                                                      SHA-512:7EA1ABD02CD8461DD91576B5BCB46B6E3AE25F94BC7936DC051C0964F4EA2F55C58CB1FA6C3A82334AAAAFCDBD6D6DBEBE33FB1C7C45FBDCA5EC43FD46A970A7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Dushanbe) {. {-9223372036854775808 16512 0 LMT}. {-1441168512 18000 0 +05}. {-1247547600 21600 0 +06}. {354909600 25200 1 +06}. {370717200 21600 0 +06}. {386445600 25200 1 +06}. {402253200 21600 0 +06}. {417981600 25200 1 +06}. {433789200 21600 0 +06}. {449604000 25200 1 +06}. {465336000 21600 0 +06}. {481060800 25200 1 +06}. {496785600 21600 0 +06}. {512510400 25200 1 +06}. {528235200 21600 0 +06}. {543960000 25200 1 +06}. {559684800 21600 0 +06}. {575409600 25200 1 +06}. {591134400 21600 0 +06}. {606859200 25200 1 +06}. {622584000 21600 0 +06}. {638308800 25200 1 +06}. {654638400 21600 0 +06}. {670363200 21600 1 +06}. {684363600 18000 0 +05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7341
                                                                                      Entropy (8bit):3.6266031318601386
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:vPByq7VKviW/naKl9pUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEA:vPFi//Th2kNU4tB715pyzHy1gA
                                                                                      MD5:997FF37AE5C6E2E13664100C2FBF8E19
                                                                                      SHA1:BF59628212564E50BCC5247C534658C8B7CFF0EE
                                                                                      SHA-256:639F26A411E298948A4FAC560E218ED7079722FB4E4AAF8CE0688A3BE24868AE
                                                                                      SHA-512:41FEF2026A3062ECA62729A555D10F9ABA777CCBE4E907489B74FC91C645E6010ECFABD2ACB4ED652ADF97E0A69935CB2FADA6732744ED3ADA95DD2EB3C08655
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Famagusta) {. {-9223372036854775808 8148 0 LMT}. {-1518920148 7200 0 EET}. {166572000 10800 1 EEST}. {182293200 7200 0 EET}. {200959200 10800 1 EEST}. {213829200 7200 0 EET}. {228866400 10800 1 EEST}. {243982800 7200 0 EET}. {260316000 10800 1 EEST}. {276123600 7200 0 EET}. {291765600 10800 1 EEST}. {307486800 7200 0 EET}. {323820000 10800 1 EEST}. {338936400 7200 0 EET}. {354664800 10800 1 EEST}. {370386000 7200 0 EET}. {386114400 10800 1 EEST}. {401835600 7200 0 EET}. {417564000 10800 1 EEST}. {433285200 7200 0 EET}. {449013600 10800 1 EEST}. {465339600 7200 0 EET}. {481068000 10800 1 EEST}. {496789200 7200 0 EET}. {512517600 10800 1 EEST}. {528238800 7200 0 EET}. {543967200 10800 1 EEST}. {559688400 7200 0 EET}. {575416800 10800 1 EEST}. {591138000 7200 0 EET}. {606866400 10800 1 EEST}. {622587600 7200 0 EET}. {638316000 108
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7974
                                                                                      Entropy (8bit):3.660638074803316
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:uR7CUoVy0FUeLR2S5nfclzdVYi8x6PxGtv2h4WSwLnRPCILXwuiaAXOH4g1iWThA:uRiVy0WetivMKRPCAXwZ6plyk8B
                                                                                      MD5:45C8B6CB180839A1F3D500071D1AFC1D
                                                                                      SHA1:59E900FB2D7BFF44AED578B9BD10AA0530B4F5D1
                                                                                      SHA-256:FA459622B54CD0A5603323EA00CE64D63BBC957EC0BDCC9BE73D48916237619C
                                                                                      SHA-512:5F485299D6DF9EBD620D2AEF7BDE21C7505EAD51467699874408691C644E9E6D8C63DD6061489E924B95672A227B5B9921E4281405981FCBBCA4619F80195AB5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Gaza) {. {-9223372036854775808 8272 0 LMT}. {-2185409872 7200 0 EEST}. {-933645600 10800 1 EEST}. {-857358000 7200 0 EEST}. {-844300800 10800 1 EEST}. {-825822000 7200 0 EEST}. {-812685600 10800 1 EEST}. {-794199600 7200 0 EEST}. {-779853600 10800 1 EEST}. {-762656400 7200 0 EEST}. {-748310400 10800 1 EEST}. {-731127600 7200 0 EEST}. {-682653600 7200 0 EET}. {-399088800 10800 1 EEST}. {-386650800 7200 0 EET}. {-368330400 10800 1 EEST}. {-355114800 7200 0 EET}. {-336790800 10800 1 EEST}. {-323654400 7200 0 EET}. {-305168400 10800 1 EEST}. {-292032000 7200 0 EET}. {-273632400 10800 1 EEST}. {-260496000 7200 0 EET}. {-242096400 10800 1 EEST}. {-228960000 7200 0 EET}. {-210560400 10800 1 EEST}. {-197424000 7200 0 EET}. {-178938000 10800 1 EEST}. {-165801600 7200 0 EET}. {-147402000 10800 1 EEST}. {-134265600 7200 0 EET}. {-115866000 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):174
                                                                                      Entropy (8bit):4.814799933523261
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qvwVAIgNtA2WFKwHp4WFKdv:SlSWB9IZaM3yMwVAIgE2wKi4wKt
                                                                                      MD5:2B286E58F2214F7A28D2A678B905CFA3
                                                                                      SHA1:A76B2D8BA2EA264FE84C5C1ED3A6D3E13288132F
                                                                                      SHA-256:6917C89A78ED54DD0C5C9968E5149D42727A9299723EC1D2EBD531A65AD37227
                                                                                      SHA-512:0022B48003FE9C8722FD1762FFB8E07E731661900FCE40BD6FE82B70F162FF5D32888028519D51682863ADCAC6DD21D35634CA06489FD4B704DA5A8A018BF26F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Shanghai)]} {. LoadTimeZoneFile Asia/Shanghai.}.set TZData(:Asia/Harbin) $TZData(:Asia/Shanghai).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7950
                                                                                      Entropy (8bit):3.6634483349947593
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:JrCUoVy0FUeLR2S5nfclzdVYi8x6PxGtv2h4WFwLnRPCILXwuiaAXOH4g1iWThiD:JyVy0WetivMvRPCAXwZ6plyk8B
                                                                                      MD5:67602731E9D02418D0B1DCBCB9367870
                                                                                      SHA1:13D896B6B8B553879D70BFBA6734AFDFE3A522A4
                                                                                      SHA-256:9D89F879C6F47F05015C8B7D66639AAC8AF2D5A6F733CDA60CFF22EB0EB71221
                                                                                      SHA-512:ECA8EB42144EF4097E606AC57795491248D02C331CE426E7C23D42490F873CD19924F1C2318E2FF1D18E275F3CAD60E9DFBB08B4B8334EA3FF1EE31452B9E167
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Hebron) {. {-9223372036854775808 8423 0 LMT}. {-2185410023 7200 0 EEST}. {-933645600 10800 1 EEST}. {-857358000 7200 0 EEST}. {-844300800 10800 1 EEST}. {-825822000 7200 0 EEST}. {-812685600 10800 1 EEST}. {-794199600 7200 0 EEST}. {-779853600 10800 1 EEST}. {-762656400 7200 0 EEST}. {-748310400 10800 1 EEST}. {-731127600 7200 0 EEST}. {-682653600 7200 0 EET}. {-399088800 10800 1 EEST}. {-386650800 7200 0 EET}. {-368330400 10800 1 EEST}. {-355114800 7200 0 EET}. {-336790800 10800 1 EEST}. {-323654400 7200 0 EET}. {-305168400 10800 1 EEST}. {-292032000 7200 0 EET}. {-273632400 10800 1 EEST}. {-260496000 7200 0 EET}. {-242096400 10800 1 EEST}. {-228960000 7200 0 EET}. {-210560400 10800 1 EEST}. {-197424000 7200 0 EET}. {-178938000 10800 1 EEST}. {-165801600 7200 0 EET}. {-147402000 10800 1 EEST}. {-134265600 7200 0 EET}. {-115866000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):381
                                                                                      Entropy (8bit):4.352557338100764
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKKACm2OHAT1P3XTxYCMVSYv/lTkd+zvScCBcFVtQvMVSYv/vMUEkB5:MBp52SmdHqP3tYZF/Cd+zHCBiVikF/v9
                                                                                      MD5:41EF18FF071B8541A5CA830C131B22D3
                                                                                      SHA1:65E502FD93FE025FD7B358B2953335F4B41BBC68
                                                                                      SHA-256:95525205BC65B8DB626EF5257F6C3A93A4902AB6415C080EE67399B41D9AD7AA
                                                                                      SHA-512:3889199D84CE456CC7231B0A81CCA7F4C976ED13015869BF486078075F24687C588F9FB52E09744ED4763CA71CC869048C588CDD42C2EA195A9B04EB9C18A123
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Ho_Chi_Minh) {. {-9223372036854775808 25600 0 LMT}. {-2004073600 25590 0 PLMT}. {-1851577590 25200 0 +07}. {-852105600 28800 0 +08}. {-782643600 32400 0 +09}. {-767869200 25200 0 +07}. {-718095600 28800 0 +08}. {-457776000 25200 0 +07}. {-315648000 28800 0 +08}. {171820800 25200 0 +07}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2150
                                                                                      Entropy (8bit):3.923186571913929
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQPeCtKkjz1lk/mJURqMJDHxyOPq8vWhV0Z8dX83FdX1BzX4JX/v9YsKP2ieGklq:5tK+Zlim0nltdT1BD45X+iA3tnN7
                                                                                      MD5:BBA59A5886F48DCEC5CEFDB689D36880
                                                                                      SHA1:8207DE6AB5F7EC6077506ED3AE2EEA3AB35C5FAE
                                                                                      SHA-256:F66F0F161B55571CC52167427C050327D4DB98AD58C6589FF908603CD53447F0
                                                                                      SHA-512:D071D97E6773FC22ABCCE3C8BE133E0FDA40C385234FEB23F69C84ABB9042E319D6891BD9CA65F2E0A048E6F374DB91E8880DCD9711A86B79A3A058517A3DBFA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Hong_Kong) {. {-9223372036854775808 27402 0 LMT}. {-2056693002 28800 0 HKT}. {-907389000 32400 1 HKST}. {-891667800 28800 0 HKT}. {-884246400 32400 0 JST}. {-766746000 28800 0 HKT}. {-747981000 32400 1 HKST}. {-728544600 28800 0 HKT}. {-717049800 32400 1 HKST}. {-694503000 28800 0 HKT}. {-683785800 32400 1 HKST}. {-668064600 28800 0 HKT}. {-654755400 32400 1 HKST}. {-636615000 28800 0 HKT}. {-623305800 32400 1 HKST}. {-605165400 28800 0 HKT}. {-591856200 32400 1 HKST}. {-573715800 28800 0 HKT}. {-559801800 32400 1 HKST}. {-542352600 28800 0 HKT}. {-528352200 32400 1 HKST}. {-510211800 28800 0 HKT}. {-498112200 32400 1 HKST}. {-478762200 28800 0 HKT}. {-466662600 32400 1 HKST}. {-446707800 28800 0 HKT}. {-435213000 32400 1 HKST}. {-415258200 28800 0 HKT}. {-403158600 32400 1 HKST}. {-383808600 28800 0 HKT}. {-371709000 32400 1 HKST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1528
                                                                                      Entropy (8bit):3.661748285763298
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQxEecP9NQwOkN/DN9yinNQHhNY0NVgN8wNy7nNA8eZN0vNb7NBN5pNUckNBe/v9:5MjQwJ/pMiNQXYGVy8iy7NA8ev0VbxX3
                                                                                      MD5:6CF9D198D7CC1F0E16DDFE91A6B4A1A5
                                                                                      SHA1:D1DEE309E479271CDC3A306272CF4D94367EC68A
                                                                                      SHA-256:7E189D7937E5B41CD94AB5208E40C645BE678F2A4F4B02EE1305595E5296E3D0
                                                                                      SHA-512:56488F1DD1C694457FC7F8B13550B3D2B3BC737241E311783135115E2BD585FDD083A5146488A121BC02CC1F05EF40C05A88EED1AF391FB9E4653C1F25CC4AF7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Hovd) {. {-9223372036854775808 21996 0 LMT}. {-2032927596 21600 0 +06}. {252439200 25200 0 +07}. {417978000 28800 1 +07}. {433785600 25200 0 +07}. {449600400 28800 1 +07}. {465321600 25200 0 +07}. {481050000 28800 1 +07}. {496771200 25200 0 +07}. {512499600 28800 1 +07}. {528220800 25200 0 +07}. {543949200 28800 1 +07}. {559670400 25200 0 +07}. {575398800 28800 1 +07}. {591120000 25200 0 +07}. {606848400 28800 1 +07}. {622569600 25200 0 +07}. {638298000 28800 1 +07}. {654624000 25200 0 +07}. {670352400 28800 1 +07}. {686073600 25200 0 +07}. {701802000 28800 1 +07}. {717523200 25200 0 +07}. {733251600 28800 1 +07}. {748972800 25200 0 +07}. {764701200 28800 1 +07}. {780422400 25200 0 +07}. {796150800 28800 1 +07}. {811872000 25200 0 +07}. {828205200 28800 1 +07}. {843926400 25200 0 +07}. {859654800 28800 1 +07}. {875376000 25200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2017
                                                                                      Entropy (8bit):3.6386982097761646
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5ykBJaTcSANEWiLwyyzLyonofMQa3go8h8PNhRHbsb0k4xiRhIsJ2sbA:BB656ofU5ARdN8
                                                                                      MD5:E4995DD6F78F859B17952F15DB554ADC
                                                                                      SHA1:19D4957E2A8CC17BCA7F020E4DF411F0E3AC8B49
                                                                                      SHA-256:122FEB27760CC2CD714531CF68E6C77F8505E9CA11A147DDA649E2C98E150494
                                                                                      SHA-512:A36B334E72C9D0854F0DE040EEEBF7B92E537F770D4EEBB1697AB9DD6AB00E678BE58A7CE2514A4667BA2B8760625C22D21AFE3AB80C5B1DBB7C10E91CDDDB3A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Irkutsk) {. {-9223372036854775808 25025 0 LMT}. {-2840165825 25025 0 IMT}. {-1575874625 25200 0 +07}. {-1247554800 28800 0 +09}. {354902400 32400 1 +09}. {370710000 28800 0 +08}. {386438400 32400 1 +09}. {402246000 28800 0 +08}. {417974400 32400 1 +09}. {433782000 28800 0 +08}. {449596800 32400 1 +09}. {465328800 28800 0 +08}. {481053600 32400 1 +09}. {496778400 28800 0 +08}. {512503200 32400 1 +09}. {528228000 28800 0 +08}. {543952800 32400 1 +09}. {559677600 28800 0 +08}. {575402400 32400 1 +09}. {591127200 28800 0 +08}. {606852000 32400 1 +09}. {622576800 28800 0 +08}. {638301600 32400 1 +09}. {654631200 28800 0 +08}. {670356000 25200 0 +08}. {670359600 28800 1 +08}. {686084400 25200 0 +07}. {695761200 28800 0 +09}. {701805600 32400 1 +09}. {717530400 28800 0 +08}. {733255200 32400 1 +09}. {748980000 28800 0 +08}. {764704800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):182
                                                                                      Entropy (8bit):4.853387718159342
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV0XaDvFVAIgoq3XPHt2WFK4HB/8QaqXNn:SlSWB9IZaM3ymQazFVAIgoQPHt2wK4HJ
                                                                                      MD5:7EC8D7D32DC13BE15122D8E26C55F9A2
                                                                                      SHA1:5B07C7161F236DF34B0FA83007ECD75B6435F420
                                                                                      SHA-256:434B8D0E3034656B3E1561615CCA192EFA62942F285CD59338313710900DB6CB
                                                                                      SHA-512:D8F1999AF509871C0A7184CFEFB0A50C174ABDE218330D9CDC784C7599A655AD55F6F2173096EA91EE5700B978B9A94BBFCA41970206E7ADEB804D0EE03B45ED
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Istanbul)]} {. LoadTimeZoneFile Europe/Istanbul.}.set TZData(:Asia/Istanbul) $TZData(:Europe/Istanbul).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):357
                                                                                      Entropy (8bit):4.4086954127843585
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKcr6m2OHATJesaSY4SMNkc5q/MVSSmWSyvScCAdMVSSo1CkDF4mMVt:MBp52E6mdHjkAc5aMxdSyHCQMxoRDF4d
                                                                                      MD5:88C82B18565C27E050074AD02536D257
                                                                                      SHA1:9A150FCD9FAA0E903D70A719D949D00D82F531E3
                                                                                      SHA-256:BC07AE610EF38F63EFF384E0815F6F64E79C61297F1C21469B2C5F19679CEAFB
                                                                                      SHA-512:29152E0359BC0FB8648BC959DE01D0BCCD17EB928AE000FF77958E7F00FF7D65BFD2C740B438E114D53ABA260B7855B2695EF7C0484850A77FFF34F7A0B255CC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Jakarta) {. {-9223372036854775808 25632 0 LMT}. {-3231299232 25632 0 BMT}. {-1451719200 26400 0 +0720}. {-1172906400 27000 0 +0730}. {-876641400 32400 0 +09}. {-766054800 27000 0 +0730}. {-683883000 28800 0 +08}. {-620812800 27000 0 +0730}. {-189415800 25200 0 WIB}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):205
                                                                                      Entropy (8bit):4.7830039894710366
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKcjm2OHG4YVkcfvScCvowkVcrd1CV4zvhL:MBp52omdHNYacfHCvop2BMVkV
                                                                                      MD5:3C073BD9DFD2C4F9BC95C8A94652FF5D
                                                                                      SHA1:F4084CDFC025B3A21092DE18DD8ECAFCA5F0EBBB
                                                                                      SHA-256:82FC06E73477EBB50C894244C91E613BF3551053359798F42F2F2C913730A470
                                                                                      SHA-512:7E79E4425A0D855AAE8DCF5C7196AABE8E75D92CD9B65C61B82B31B29395D4A5F2D8B1E90454037753D03A1BDDE44E8F15D7E999E65C49BE8E8F8A2B2C4EECD0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Jayapura) {. {-9223372036854775808 33768 0 LMT}. {-1172913768 32400 0 +09}. {-799491600 34200 0 +0930}. {-189423000 32400 0 WIT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7690
                                                                                      Entropy (8bit):3.684387169764595
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:GzmnxfFtWR8fKnG/QvW+tCE5nfclzdVYi8x6PxGtv2TiGuyLsbAicBnKqXRGlGrz:0mKivDivbOKWKwX5BrAZp0
                                                                                      MD5:4C37DF27AB1E906CC624A62288847BA8
                                                                                      SHA1:BE690D3958A4A6722ABDF047BF22ACEC8B6D6AFE
                                                                                      SHA-256:F10DF7378FF71EDA45E8B1C007A280BBD4629972D12EAB0C6BA7623E98AAFA17
                                                                                      SHA-512:B14F5FB330078A564796114FA6804EA12CE0AD6B2DF6D871FF6E7B416425B12FFD6B4E8511FCD55609FBCE95C8EDFF1E14B1C8C505F4B5B66F47EA52FD53F307
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Jerusalem) {. {-9223372036854775808 8454 0 LMT}. {-2840149254 8440 0 JMT}. {-1641003640 7200 0 IST}. {-933645600 10800 1 IDT}. {-857358000 7200 0 IST}. {-844300800 10800 1 IDT}. {-825822000 7200 0 IST}. {-812685600 10800 1 IDT}. {-794199600 7200 0 IST}. {-779853600 10800 1 IDT}. {-762656400 7200 0 IST}. {-748310400 10800 1 IDT}. {-731127600 7200 0 IST}. {-681962400 14400 1 IDDT}. {-673243200 10800 1 IDT}. {-667962000 7200 0 IST}. {-652327200 10800 1 IDT}. {-636426000 7200 0 IST}. {-622087200 10800 1 IDT}. {-608947200 7200 0 IST}. {-591847200 10800 1 IDT}. {-572486400 7200 0 IST}. {-558576000 10800 1 IDT}. {-542851200 7200 0 IST}. {-527731200 10800 1 IDT}. {-514425600 7200 0 IST}. {-490845600 10800 1 IDT}. {-482986800 7200 0 IST}. {-459475200 10800 1 IDT}. {-451537200 7200 0 IST}. {-428551200 10800 1 IDT}. {-418262400 7200 0 IST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.804360783547797
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52WFKTwkXGm2OHodFxsYvXgVHURRNVsRYvFFqdj/cXHFOVRWh:SlSWB9X52wKTEm2OHoH+YPgVHURbSQF9
                                                                                      MD5:9A8CCA0B4337CB6FA15BF1A4F01F6C22
                                                                                      SHA1:A4C72FC1EF6EEBDBB5C8C698BCB298DFB5061726
                                                                                      SHA-256:4F266D90C413FA44DFCA5BE13E45C00428C694AC662CB06F2451CC3FF08E080F
                                                                                      SHA-512:E8074AA0D8B15EE33D279C97A01FF69451A99C7711FFD66B3E9B6B6B021DE957A63F6B747C7A63E3F3C1241E0A2687D81E780D6B54228EE6B7EB9040D7F06A60
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kabul) {. {-9223372036854775808 16608 0 LMT}. {-2524538208 14400 0 +04}. {-788932800 16200 0 +0430}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1989
                                                                                      Entropy (8bit):3.6993158455985338
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQ+3e8/HklxL7/Fpd2kNNxLcULBQdHl2yYvpQ62itgUiRrn5d6kGFF6UERWkBUHA:5c/HezFvpchKvW62XPdXJMwT3Lea
                                                                                      MD5:496BD39D36218DF67279DA8DE9C7457B
                                                                                      SHA1:8AE6E5CF7E1E693D11A112B75A0D24A135E94487
                                                                                      SHA-256:6B757333C12F2BFE782258D7E9126ECE0E62696EF9C24B2955A791145D6780E9
                                                                                      SHA-512:BADBF7893825F6C7053A23A7AA11B45A2EDBECC4580695BB6B8E568B7FFE5ED72BF61019F3CB6D7B8E663ACAF099F26E266450EC03F3C6B2F8E34BA0D12D100A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kamchatka) {. {-9223372036854775808 38076 0 LMT}. {-1487759676 39600 0 +11}. {-1247569200 43200 0 +13}. {354888000 46800 1 +13}. {370695600 43200 0 +12}. {386424000 46800 1 +13}. {402231600 43200 0 +12}. {417960000 46800 1 +13}. {433767600 43200 0 +12}. {449582400 46800 1 +13}. {465314400 43200 0 +12}. {481039200 46800 1 +13}. {496764000 43200 0 +12}. {512488800 46800 1 +13}. {528213600 43200 0 +12}. {543938400 46800 1 +13}. {559663200 43200 0 +12}. {575388000 46800 1 +13}. {591112800 43200 0 +12}. {606837600 46800 1 +13}. {622562400 43200 0 +12}. {638287200 46800 1 +13}. {654616800 43200 0 +12}. {670341600 39600 0 +12}. {670345200 43200 1 +12}. {686070000 39600 0 +11}. {695746800 43200 0 +13}. {701791200 46800 1 +13}. {717516000 43200 0 +12}. {733240800 46800 1 +13}. {748965600 43200 0 +12}. {764690400 46800 1 +13}. {780415200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):441
                                                                                      Entropy (8bit):4.32891547054552
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52SmdH35S6DvjRQ+vjjEn6S7Pictk6a2iW6oNl:cQSe3pjRQ+jjE6S7lTh
                                                                                      MD5:7A7CFCB7273FCAE33F77048F225BBBBD
                                                                                      SHA1:44701B91CBC61FCAC8EEB6E67BCCA0403E9FDD7E
                                                                                      SHA-256:9F8C46E5AC4DF691DDCB13C853660915C94316E73F74DD36AF889D5137F1761B
                                                                                      SHA-512:44D5A0656032D61152C98B92E3ACA88197A73D87E2D0E8853D6A0E430BDF9290D3B718F9E5864840A6FFA59CDC0D4D47BCEE0471F176E62A05C1083CB35BEBB1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Karachi) {. {-9223372036854775808 16092 0 LMT}. {-1988166492 19800 0 +0530}. {-862637400 23400 1 +0630}. {-764145000 19800 0 +0530}. {-576135000 18000 0 +05}. {38775600 18000 0 PKT}. {1018119600 21600 1 PKST}. {1033840800 18000 0 PKT}. {1212260400 21600 1 PKST}. {1225476000 18000 0 PKT}. {1239735600 21600 1 PKST}. {1257012000 18000 0 PKT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):169
                                                                                      Entropy (8bit):4.920527043039276
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8s4YkdVAIgNrMvN2WFKu3e2WFKjvn:SlSWB9IZaM3yMGdVAIgWvN2wKulwKjvn
                                                                                      MD5:9A66108527388564A9FBDB87D586105F
                                                                                      SHA1:945E043A3CC45A4654C2D745A48E1D15F80A3CB5
                                                                                      SHA-256:E2965AF4328FB065A82E8A21FF342C29A5942C2EDD304CE1C9087A23A91B65E1
                                                                                      SHA-512:C3985D972AFB27E194CBE117E6CF8C45AA5A1B6504133FF85D52E8024387133D11F9EE7238FF87DC1D96F140B9467E6DB3F99B0B98299E6782A643288ABD3308
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Urumqi)]} {. LoadTimeZoneFile Asia/Urumqi.}.set TZData(:Asia/Kashgar) $TZData(:Asia/Urumqi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):178
                                                                                      Entropy (8bit):4.8475287330512495
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52WFKXIi7mFSXGm2OHF+VT5vUQKwMTXvv6QzFrRk8P4VvWVQC:SlSWB9X52wKYgyJm2OH0T5RNMzvSQhR5
                                                                                      MD5:FEFB0E2021110BC9175AC505536BDE12
                                                                                      SHA1:8366110D91C7EA929DB300871DDC70808D458F90
                                                                                      SHA-256:C4E46CE4385C676F5D7AC4B123C42F153F7B3F3E9F434698E8D56E1907A9B7C9
                                                                                      SHA-512:F8F9EE0B8648154B3E3BEF192C58F2415475422BED139F20FD3D3EF253E8137CBB39AB769704AB1F20EE03B398402BC5B4A3E55BE284D1785F347B951FECEF62
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kathmandu) {. {-9223372036854775808 20476 0 LMT}. {-1577943676 19800 0 +0530}. {504901800 20700 0 +0545}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.786408960928606
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8yIi7VyVAIgN1AIilHt2WFKSiZ1/2WFKXIi7v:SlSWB9IZaM3y7gVyVAIg5M2wKSg1/2wm
                                                                                      MD5:A30FEA461B22B2CB3A67A616E3AE08FD
                                                                                      SHA1:F368B215E15F6F518AEBC92289EE703DCAE849A1
                                                                                      SHA-256:1E2A1569FE432CDA75C64FA55E24CA6F938C1C72C15FBB280D5B04F6C5E9AD69
                                                                                      SHA-512:4F3D0681791C23EF19AFF239D2932D2CE1C991406F6DC8E313C083B5E03D806D26337ED2477700596D9A9F4FB1B7FC4A551F897A2A88CB7253CC7F863E586F03
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Kathmandu)]} {. LoadTimeZoneFile Asia/Kathmandu.}.set TZData(:Asia/Katmandu) $TZData(:Asia/Kathmandu).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2046
                                                                                      Entropy (8bit):3.6162520408317844
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQNobe1I6oziDpiKXtyiyzilUBinUijiRziiiaSiYzYWk2HgQiMhNIziPiRikiA/:5NoV9InX4n7m84nPIzOtVEChbmAPD6
                                                                                      MD5:0AB1CB51373021D2929AD3BB6A6A7B36
                                                                                      SHA1:6A58A13DE2479D7C07DA574A2850DB5479F42106
                                                                                      SHA-256:7C282AFCBC654495AD174C5679C0FDA9C65DED557389648F924E809E337DF6A5
                                                                                      SHA-512:E865073DF7273319ADE90C0520D843C636679ACFF1FEEC4C62B85AB7458393A71EAAE32F507D90863BE4018212B497E41EFC7EA684DF821A0D4FF1A9895FDCD8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Khandyga) {. {-9223372036854775808 32533 0 LMT}. {-1579424533 28800 0 +08}. {-1247558400 32400 0 +10}. {354898800 36000 1 +10}. {370706400 32400 0 +09}. {386434800 36000 1 +10}. {402242400 32400 0 +09}. {417970800 36000 1 +10}. {433778400 32400 0 +09}. {449593200 36000 1 +10}. {465325200 32400 0 +09}. {481050000 36000 1 +10}. {496774800 32400 0 +09}. {512499600 36000 1 +10}. {528224400 32400 0 +09}. {543949200 36000 1 +10}. {559674000 32400 0 +09}. {575398800 36000 1 +10}. {591123600 32400 0 +09}. {606848400 36000 1 +10}. {622573200 32400 0 +09}. {638298000 36000 1 +10}. {654627600 32400 0 +09}. {670352400 28800 0 +09}. {670356000 32400 1 +09}. {686080800 28800 0 +08}. {695757600 32400 0 +10}. {701802000 36000 1 +10}. {717526800 32400 0 +09}. {733251600 36000 1 +10}. {748976400 32400 0 +09}. {764701200 36000 1 +10}. {780426000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):324
                                                                                      Entropy (8bit):4.554598325373998
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKvCm2OHEX3gYLXdUvvVQLpUFGZjSVVFJGTNsR/tckVVFJGTL/FG/+d:MBp523CmdHNYjWXVQtUEZjAJGJs55vJg
                                                                                      MD5:FABB53074E1D767952C664BBA02E8975
                                                                                      SHA1:36D2D438FEEBF585D7A0B546647C08B63A582EA1
                                                                                      SHA-256:DAB02F68D5EEA0DAC6A2BBB7D12930E1B4DA62EBAEC7DE35C0AA55F72CCFF139
                                                                                      SHA-512:E178779CE31F8D16DFEC5F71F228BCB05FDA1939B1BCE204C40B14904682283BDC99F27B662E3995EEEE607D0E8C70BE3CE3DF6EAD355399566CF360D5EC9E70
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kolkata) {. {-9223372036854775808 21208 0 LMT}. {-3645237208 21200 0 HMT}. {-3155694800 19270 0 MMT}. {-2019705670 19800 0 IST}. {-891581400 23400 1 +0630}. {-872058600 19800 0 IST}. {-862637400 23400 1 +0630}. {-764145000 19800 0 IST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1991
                                                                                      Entropy (8bit):3.6170298534050245
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5Mi17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7FfiC/LIcy9zU9Muq2PIX/9sC/:hjFRRCfQucXsNN0On
                                                                                      MD5:83333A0E3E9810621A8BADA29B04F256
                                                                                      SHA1:CDC375C93E7F3019562DE7CE1D9EE2776FE7FE9E
                                                                                      SHA-256:00A9E8DDDC4314F7271F7490001ABD29B6F5EAEB9080645911FF5DA8BD7F671C
                                                                                      SHA-512:08913E002C7D3D54F0E09029C70A0F2D18636F6F52B12F10593BECF732F40E180780D4C6127E0A3B321EAF54AF660A48E8C3E29A161B6ED6E0E46C06BBD309D6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Krasnoyarsk) {. {-9223372036854775808 22286 0 LMT}. {-1577513486 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {748983600 25200 0 +07}. {764708400 28800 1 +08}. {7804332
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):362
                                                                                      Entropy (8bit):4.404454529095857
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wK1NLm2OHrPmdXiWOb/MVSYv/1MesF5X8dSMd0dMVSSm8kvScCvCIMY:MBp52PLmdHrPdDTMF/wFZMxcHClMxi
                                                                                      MD5:B5FC8D431304F5C1ADF7D0B237DA5A52
                                                                                      SHA1:79FC3057CD88E4DF71421AD52C34E0127FBD6FDA
                                                                                      SHA-256:138912D754FBA8A1306063CCE897218972A4B0976EDDEC5C8E69A7965B0CD198
                                                                                      SHA-512:27DC64B43958814E1A935D817CCFE7ADE8E6E6A778E27E391683FC491764EB77774A3D4A871C4E83BBA43FF8BA2383CBB8CC2D4F1FEB1AE063735C95651865E9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kuala_Lumpur) {. {-9223372036854775808 24406 0 LMT}. {-2177477206 24925 0 SMT}. {-2038200925 25200 0 +07}. {-1167634800 26400 1 +0720}. {-1073028000 26400 0 +0720}. {-894180000 27000 0 +0730}. {-879665400 32400 0 +09}. {-767005200 27000 0 +0730}. {378664200 28800 0 +08}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):646
                                                                                      Entropy (8bit):3.99554344665026
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52HLKmdHXXUBMxoWFMcDBMxkT9r5N2Xhf7JSX3lzHC3:cQHLKeHUzaMcDBkkN5N2XV7Ja3hi3
                                                                                      MD5:2F27D1377C9EBBACDC260A50C195BDBB
                                                                                      SHA1:397B8714F2C909A8EB88A7A1F4A1AEA0A5B8E80E
                                                                                      SHA-256:519FDD455107270E6F8F3848C214D3D44CC1465B7B3E375318857D4A9093E1C0
                                                                                      SHA-512:E4583E6C3FEB5ADAD41827D8ADCD7DA34CCB92D2B62B9D7C3D59F76719B9EE2FE44697CFD00943D9E2A4DBAEB929C97A1FF520FFF62EB6829C88D71EC8C51993
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Kuching) {. {-9223372036854775808 26480 0 LMT}. {-1383463280 27000 0 +0730}. {-1167636600 28800 0 +08}. {-1082448000 30000 1 +08}. {-1074586800 28800 0 +08}. {-1050825600 30000 1 +08}. {-1042964400 28800 0 +08}. {-1019289600 30000 1 +08}. {-1011428400 28800 0 +08}. {-987753600 30000 1 +08}. {-979892400 28800 0 +08}. {-956217600 30000 1 +08}. {-948356400 28800 0 +08}. {-924595200 30000 1 +08}. {-916734000 28800 0 +08}. {-893059200 30000 1 +08}. {-885198000 28800 0 +08}. {-879667200 32400 0 +09}. {-767005200 28800 0 +08}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):168
                                                                                      Entropy (8bit):4.82804794783422
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8t1zVAIgNsM1E2WFKdQWFK81S:SlSWB9IZaM3yN1zVAIgaM1E2wKdQwK8c
                                                                                      MD5:6D6109F6EC1E12881C60EC44AAEB772B
                                                                                      SHA1:B5531BEAC1C07DA57A901D0A48F4E1AC03F07467
                                                                                      SHA-256:67BB9F159C752C744AC6AB26BBC0688CF4FA94C58C23B2B49B871CAA8774FC5D
                                                                                      SHA-512:B0624B9F936E5C1392B7EBB3190D7E97EAE96647AB965BB9BE045D2C3082B1C7E48FF89A7B57FD3475D018574E7294D45B068C555A43AAEDFD65AC5C5C5D0A5B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Riyadh)]} {. LoadTimeZoneFile Asia/Riyadh.}.set TZData(:Asia/Kuwait) $TZData(:Asia/Riyadh).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):164
                                                                                      Entropy (8bit):4.729350272507574
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8PpVAIgNz5YF2WFKf+WFKjn:SlSWB9IZaM3yxVAIgLYF2wKGwKjn
                                                                                      MD5:DB6155900D4556EE7B3089860AD5C4E3
                                                                                      SHA1:708E4AE427C8BAF589509F4330C389EE55C1D514
                                                                                      SHA-256:8264648CF1EA3E352E13482DE2ACE70B97FD37FBB1F28F70011561CFCBF533EA
                                                                                      SHA-512:941D52208FABB634BABCD602CD468F2235199813F4C1C5AB82A453E8C4CE4543C1CE3CBDB9D035DB039CFFDBC94D5D0F9D29363442E2458426BDD52ECDF7C3C5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Macau)]} {. LoadTimeZoneFile Asia/Macau.}.set TZData(:Asia/Macao) $TZData(:Asia/Macau).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2141
                                                                                      Entropy (8bit):3.8815104664173843
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5o89px1D/MG/B/j/gf/d/iM/MW/C/2/Y/yf/9/y/l/v1EG/vFw/veE/K/Z/D/U/h:/p7DD5L2lRkWqOA6fVKdXqGXFwXeECRK
                                                                                      MD5:DC20959BDB02CF86A33CE2C82D4D9853
                                                                                      SHA1:90FC1820FA0E3B1C4BD2158185F95DCD1AA271D6
                                                                                      SHA-256:6263F011537DB5CAF6B09F16D55DADE527A475AEE04F1BA38A75D13E9D125355
                                                                                      SHA-512:8C6D0FA9584595B93A563D60387520CE9B28595C2C3880004275BAE66313A7606379646D27FB5EB91EC8D96D3B23959E2F9E3ABC97C203FD76E1DCC5ABB64374
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Macau) {. {-9223372036854775808 27250 0 LMT}. {-2056692850 28800 0 CST}. {-884509200 32400 0 +09}. {-873280800 36000 1 +09}. {-855918000 32400 0 +09}. {-841744800 36000 1 +09}. {-828529200 32400 0 +10}. {-765363600 28800 0 CT}. {-747046800 32400 1 CDT}. {-733827600 28800 0 CST}. {-716461200 32400 1 CDT}. {-697021200 28800 0 CST}. {-683715600 32400 1 CDT}. {-667990800 28800 0 CST}. {-654771600 32400 1 CDT}. {-636627600 28800 0 CST}. {-623322000 32400 1 CDT}. {-605178000 28800 0 CST}. {-591872400 32400 1 CDT}. {-573642000 28800 0 CST}. {-559818000 32400 1 CDT}. {-541674000 28800 0 CST}. {-528368400 32400 1 CDT}. {-510224400 28800 0 CST}. {-498128400 32400 1 CDT}. {-478774800 28800 0 CST}. {-466678800 32400 1 CDT}. {-446720400 28800 0 CST}. {-435229200 32400 1 CDT}. {-415258200 28800 0 CST}. {-403158600 32400 1 CDT}. {-383808600 2880
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2016
                                                                                      Entropy (8bit):3.6746770806664517
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQmecGdvBOCdwdVdptQvMCTP2rF1gCzlODU9xE305r/CXVWWHs/gSNkna:5tvBHwRw/P2rFGAlODU9PZUEWQgmka
                                                                                      MD5:18E80309362762B7757629B51F28AF99
                                                                                      SHA1:502C70F24251BC062785A9349E6204CB719BF932
                                                                                      SHA-256:6493D629E3CD4DB555A547F942BCCB4FFC7BBF7298FFBF9503F6DE3177ADBAC9
                                                                                      SHA-512:C477E0DCF4E78E57E075FB5CAA45E70D4864EDFC40EAC2DD43D80F71408836E5BD468B15EB34B95020F2DB6CE531D67F076EF8EED4833ADEC1F6D37B2200CC84
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Magadan) {. {-9223372036854775808 36192 0 LMT}. {-1441188192 36000 0 +10}. {-1247565600 39600 0 +12}. {354891600 43200 1 +12}. {370699200 39600 0 +11}. {386427600 43200 1 +12}. {402235200 39600 0 +11}. {417963600 43200 1 +12}. {433771200 39600 0 +11}. {449586000 43200 1 +12}. {465318000 39600 0 +11}. {481042800 43200 1 +12}. {496767600 39600 0 +11}. {512492400 43200 1 +12}. {528217200 39600 0 +11}. {543942000 43200 1 +12}. {559666800 39600 0 +11}. {575391600 43200 1 +12}. {591116400 39600 0 +11}. {606841200 43200 1 +12}. {622566000 39600 0 +11}. {638290800 43200 1 +12}. {654620400 39600 0 +11}. {670345200 36000 0 +11}. {670348800 39600 1 +11}. {686073600 36000 0 +10}. {695750400 39600 0 +12}. {701794800 43200 1 +12}. {717519600 39600 0 +11}. {733244400 43200 1 +12}. {748969200 39600 0 +11}. {764694000 43200 1 +12}. {780418800 3
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):234
                                                                                      Entropy (8bit):4.682322181661182
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKCm2OHUVRYQTLQTvUfkc3gEkNHkH8vScCxWv:MBp526mdHsrTD8cQJl7HCMv
                                                                                      MD5:87D843314195847B6E4117119A1F701C
                                                                                      SHA1:E51DC3A0BF20B09D8745AC682B4869A031A0A515
                                                                                      SHA-256:22046165D40C8A553FE22A28E127514DF469E79581E0746101816A973456029D
                                                                                      SHA-512:D241803442876A59170C1A90ACC66DEAF169CBF9B8CD7DE964BEF02D222B1D07511E241D441C3DA6AE7A7D1AAC1F4EDB5A21655C2923A3807BBFA8630071BCE9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Makassar) {. {-9223372036854775808 28656 0 LMT}. {-1577951856 28656 0 MMT}. {-1172908656 28800 0 +08}. {-880272000 32400 0 +09}. {-766054800 28800 0 WITA}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):406
                                                                                      Entropy (8bit):4.4205762929520755
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52G4JmdHnzZBPE6JwucQzX4rjJbmJtKn:cQG4Je11RbXzXqQ+
                                                                                      MD5:3A833BF91AFE7FABBA98D11F29D84EAA
                                                                                      SHA1:1622BEF54A12DE163B77309A0B7AF1C38AA6324B
                                                                                      SHA-256:665E07B7A01E8A9D04B76B74B2EA0D11BDFC0BE6CA855DFDDBB5F9A6C9A97E90
                                                                                      SHA-512:DFABB558CE2A8B96A976DD3B45B78CECE3633D51EE67F24E5AD59C7CF388538C5560EC133C60C3F0AFE8C68D88B1C05A12608A0408ACECBEEC38A84E3DC972FC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Manila) {. {-9223372036854775808 -57360 0 LMT}. {-3944621040 29040 0 LMT}. {-2229321840 28800 0 PST}. {-1046678400 32400 1 PDT}. {-1038733200 28800 0 PST}. {-873273600 32400 0 JST}. {-794221200 28800 0 PST}. {-496224000 32400 1 PDT}. {-489315600 28800 0 PST}. {259344000 32400 1 PDT}. {275151600 28800 0 PST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):165
                                                                                      Entropy (8bit):4.754394427749078
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8DhVAIgN6Sn62WFKvE+H+WFKQo:SlSWB9IZaM3yjhVAIgMS62wKLewKQo
                                                                                      MD5:5D8EBBC297A2258C352BC80535B7F7F1
                                                                                      SHA1:684CAF480AF5B8A98D9AD1A1ECD4E07434F36875
                                                                                      SHA-256:4709F2DA036EB96FB7B6CC40859BF59F1146FE8D3A7AFE326FBA3B8CB68049CE
                                                                                      SHA-512:FD67E920D3D5FE69AF35535A8BBD2791204C6B63050EFECC0857F24D393712C4BC4660EA0A350D2A4DDA144073413BE013D71D73E6F3638CA30480541F9731FA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Dubai)]} {. LoadTimeZoneFile Asia/Dubai.}.set TZData(:Asia/Muscat) $TZData(:Asia/Dubai).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7368
                                                                                      Entropy (8bit):3.620699686510499
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:EPByq7VKviW/naKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEA:EPFi//uh2kNU4tB715pyzHy1gA
                                                                                      MD5:21EEEC6314C94D1476C2E79BBACFEB77
                                                                                      SHA1:2C9805CD01C84D446CBDB90B9542CB24CCDE4E39
                                                                                      SHA-256:7AAB1AC67D96287EE468608506868707B28FCD27A8F53128621801DCF0122162
                                                                                      SHA-512:D4B0A0E60B102E10E03CF5BD07C5783E908D5E7079B646177C57C30D67B44C114EFF4DCFC71AF8441D67BD5A351068FBFFD8C5E08F06F1D69946B3EA7D49FC2D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Nicosia) {. {-9223372036854775808 8008 0 LMT}. {-1518920008 7200 0 EET}. {166572000 10800 1 EEST}. {182293200 7200 0 EET}. {200959200 10800 1 EEST}. {213829200 7200 0 EET}. {228866400 10800 1 EEST}. {243982800 7200 0 EET}. {260316000 10800 1 EEST}. {276123600 7200 0 EET}. {291765600 10800 1 EEST}. {307486800 7200 0 EET}. {323820000 10800 1 EEST}. {338936400 7200 0 EET}. {354664800 10800 1 EEST}. {370386000 7200 0 EET}. {386114400 10800 1 EEST}. {401835600 7200 0 EET}. {417564000 10800 1 EEST}. {433285200 7200 0 EET}. {449013600 10800 1 EEST}. {465339600 7200 0 EET}. {481068000 10800 1 EEST}. {496789200 7200 0 EET}. {512517600 10800 1 EEST}. {528238800 7200 0 EET}. {543967200 10800 1 EEST}. {559688400 7200 0 EET}. {575416800 10800 1 EEST}. {591138000 7200 0 EET}. {606866400 10800 1 EEST}. {622587600 7200 0 EET}. {638316000 10800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1992
                                                                                      Entropy (8bit):3.626746433557725
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5qi17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7FfiC/LIcy9zU9Muq2PIX/9sCP:bjFRRCfQucXsNN0OX
                                                                                      MD5:11B80F2A9B7B090DD146BD97E9DB7D43
                                                                                      SHA1:4A2886799A50D031D79C935261B50363AA27768A
                                                                                      SHA-256:4018CE273BC4D02057F66A4715626F0E4D8C7050391C00BB5AE054B4DA8DE2F8
                                                                                      SHA-512:1F1650C1DBC3A171FF30C7657D7F99963A0C8D63B85460B45DE75AFABECE28F2A51236FB71DFF3EE567CC58E71B88623E4880DEBD18E9E9C9E527CF97D5FE926
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Novokuznetsk) {. {-9223372036854775808 20928 0 LMT}. {-1441259328 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {748983600 25200 0 +07}. {764708400 28800 1 +08}. {780433
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2048
                                                                                      Entropy (8bit):3.623418616375595
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5HNi17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7F/zTXUVtrBju6waUwcTLTTWF:6jFRRCfQuozB7TQt
                                                                                      MD5:46E5FB7DEB8041BC9A2ADC83728944A7
                                                                                      SHA1:B5826E206EAA3E8789A0F9E4B7511CEBFD1B6764
                                                                                      SHA-256:C241F732B9731FA141B03FF1F990556C9BF14A1B21C9757C7FF75E688908B8A0
                                                                                      SHA-512:42B6BEEE9C15CB59C010013FE0673CB0DF46CD0AC388DF7D57DCCD54482C950F2935F8A8D7DC68CFFD184B698283589134901C9C597970D95C5B608CD160AF70
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Novosibirsk) {. {-9223372036854775808 19900 0 LMT}. {-1579476700 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {738090000 25200 0 +07}. {748987200 21600 0 +06}. {7647120
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1984
                                                                                      Entropy (8bit):3.5988580260925795
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5aQyvONnwqeDinDL+8kSViqS6A+VzTXUVtrBju6waUwcTLTTW59OxJCT:IkHdiq5BzB7TQJ
                                                                                      MD5:54E1F8C11C9CF4BF1DBCABF4AF31B7D4
                                                                                      SHA1:3C428E50A02941B19AF2A2F1EA02763AA2C1A846
                                                                                      SHA-256:5B9E95C813A184C969CC9808E136AD66C1231A55E66D4EE817BD2E85751C4EE9
                                                                                      SHA-512:83DBFCC089AC902609FFFCA8E675430B9BF1EA452626E83173F83317884B6AC2620CE8AA96488ACF13445D9D1D4776EB908232BD8205B8F4F9B034A68864C9A9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Omsk) {. {-9223372036854775808 17610 0 LMT}. {-1582088010 18000 0 +05}. {-1247547600 21600 0 +07}. {354909600 25200 1 +07}. {370717200 21600 0 +06}. {386445600 25200 1 +07}. {402253200 21600 0 +06}. {417981600 25200 1 +07}. {433789200 21600 0 +06}. {449604000 25200 1 +07}. {465336000 21600 0 +06}. {481060800 25200 1 +07}. {496785600 21600 0 +06}. {512510400 25200 1 +07}. {528235200 21600 0 +06}. {543960000 25200 1 +07}. {559684800 21600 0 +06}. {575409600 25200 1 +07}. {591134400 21600 0 +06}. {606859200 25200 1 +07}. {622584000 21600 0 +06}. {638308800 25200 1 +07}. {654638400 21600 0 +06}. {670363200 18000 0 +06}. {670366800 21600 1 +06}. {686091600 18000 0 +05}. {695768400 21600 0 +07}. {701812800 25200 1 +07}. {717537600 21600 0 +06}. {733262400 25200 1 +07}. {748987200 21600 0 +06}. {764712000 25200 1 +07}. {780436800 2160
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1606
                                                                                      Entropy (8bit):3.6164715895962876
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQ3eHykSYlS7hhmSQcwqSlhJS9yiIoSBHrSLUSIYdDSVbt8i9E603CRWeZunSbOi:5FkXlkhs7bqIwIoMpqDPiBRBlL
                                                                                      MD5:38914E248C13912E33187496C5AD9691
                                                                                      SHA1:94C3711FC5EED22FE1929F2250208AC53DB175AC
                                                                                      SHA-256:581AF958787971BE487B37C2D2534E58FFA085AFD0D9F0E12E0EEFF03F476E53
                                                                                      SHA-512:8C7F21C8FCE2614181A998774E7038BAC483E502C3C31EDB0F4954E1424A0C16AD7DC5003E9533BB47CA2C06DD027E989BD696B2A74A23F686F74B8C9650BAE6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Oral) {. {-9223372036854775808 12324 0 LMT}. {-1441164324 10800 0 +03}. {-1247540400 18000 0 +05}. {354913200 21600 1 +06}. {370720800 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 14400 0 +04}. {606866400 18000 1 +04}. {622591200 14400 0 +04}. {638316000 18000 1 +04}. {654645600 14400 0 +04}. {670370400 18000 1 +04}. {686095200 14400 0 +04}. {701816400 14400 0 +04}. {701820000 18000 1 +04}. {717544800 14400 0 +04}. {733269600 18000 1 +04}. {748994400 14400 0 +04}. {764719200 1800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):175
                                                                                      Entropy (8bit):4.911861786274714
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8VLYO5YFwVAIgN8ELYOAvN2WFKeHKLNM0WFKELYOun:SlSWB9IZaM3y1LewVAIgKELUvN2wKTNp
                                                                                      MD5:754059D3B44B7D60FB3BBFC97782C6CF
                                                                                      SHA1:6AE931805E6A42836D65E4EBC76A58BBFB3DCAF4
                                                                                      SHA-256:2C2DBD952FDA5CC042073B538C240B11C5C8E614DD4A697E1AA4C80E458575D0
                                                                                      SHA-512:B5AA4B51699EEAE0D9F91BBAB5B682BD84537C4E2CCE282613E1FFA1DDBE562CA487FB2F8CD006EE9DBC9EFAEFA587EC9998F0364E5C932CDB42C14319328D46
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Bangkok)]} {. LoadTimeZoneFile Asia/Bangkok.}.set TZData(:Asia/Phnom_Penh) $TZData(:Asia/Bangkok).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):356
                                                                                      Entropy (8bit):4.428640713376822
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKT5wFJm2OHUed9xMkc5k/MVSSmCLkvScCAdMVSSo1CkDF4mMVSSmT+:MBp52L5wFJmdHFxbc5kMxvLkHCQMxoRg
                                                                                      MD5:81C643629BB417E38A5514BBEFEF55C8
                                                                                      SHA1:7D91E7F00A1A0B795EF3FDD1B3DD052EA2F6122C
                                                                                      SHA-256:998DFACE4BEE8A925E88D779D6C9FB9F9010BDB68010A9CCBC0B97BB5C49D452
                                                                                      SHA-512:1291521B74984EC03557C4DC492DB4DD1312626F61612C1F143BA482E2C32CD331647D86507D3B3721D148B2ED3CED6678123BD801DAA6B4F2D9A0C07B90575F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Pontianak) {. {-9223372036854775808 26240 0 LMT}. {-1946186240 26240 0 PMT}. {-1172906240 27000 0 +0730}. {-881220600 32400 0 +09}. {-766054800 27000 0 +0730}. {-683883000 28800 0 +08}. {-620812800 27000 0 +0730}. {-189415800 28800 0 WITA}. {567964800 25200 0 WIB}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):263
                                                                                      Entropy (8bit):4.653238218910832
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wK8cE4Lm2OHnNdRw8vm1T0vGLucjv7:MBp520cEWmdHnNLvjuD
                                                                                      MD5:96754BB7D98975118E86B539D8F917B4
                                                                                      SHA1:5D366D64E08F1E9869EA2E93B5C6C5C0C5E7E3BE
                                                                                      SHA-256:10432381A63B2101A1218D357DA2075885F061F3A60BE00A32EED4DF868E5566
                                                                                      SHA-512:58BFFF63D40CF899304D69468949B806F00F5F2F2BE47040D5704E8C463D7B502725846933749172AF94CCD0AA894E30AD3154CC953D917AC8040B00D331124E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Pyongyang) {. {-9223372036854775808 30180 0 LMT}. {-1948782180 30600 0 KST}. {-1830414600 32400 0 JST}. {-768646800 32400 0 KST}. {1439564400 30600 0 KST}. {1525446000 32400 0 KST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):169
                                                                                      Entropy (8bit):4.800949065138005
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52WFKK3vFSXGm2OHPFV4YvUQKb3VvVsRYvFF5FRVGsWYAvn:SlSWB9X52wKK3vTm2OHoYRcvSQFF5FR4
                                                                                      MD5:E70F65EBF35BE045F43456A67DEBCD34
                                                                                      SHA1:EE5669823D60518D0AAB07A7C539B8089807D589
                                                                                      SHA-256:B8E3F98A20BE938B9B1A6CE1CE4218751393B33E933A8F9278AA3EEECB13D2C6
                                                                                      SHA-512:9B142D27C92C2478ED086668F8E3DC4BD8E9FDA712D8888469816B4795B5DFDD7F5F22D7BA6A31CA4E32483ABE5A5B4C7CEFC91856B09DDF651E58867FC932C9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Qatar) {. {-9223372036854775808 12368 0 LMT}. {-1577935568 14400 0 +04}. {76190400 10800 0 +03}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1583
                                                                                      Entropy (8bit):3.64822959139346
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5UXlkhs7bqIwIoMpqDS7oXbPw+bBijbbyzIr1jA:ICOgZbWM
                                                                                      MD5:E79902C294AEFC5A3A3DCFFF4142E54F
                                                                                      SHA1:8F9E8413C8F2D1DCF7DB74BE3AF067CBFEF2E73C
                                                                                      SHA-256:4A254C094E4F5955E33C19E01EF2B8D5B70AC0AD08203FD105F475C8F862F28C
                                                                                      SHA-512:3283248979FC76BE94D705013728FF206A32B8820D475C4DFC0636D2329E8FA5D251EAE5A21D9A9DC30659A6B567E73A7C614D7DA3F60025BFEA617ACE2EE597
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Qyzylorda) {. {-9223372036854775808 15712 0 LMT}. {-1441167712 14400 0 +04}. {-1247544000 18000 0 +05}. {354913200 21600 1 +06}. {370720800 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 14400 0 +04}. {670370400 18000 1 +04}. {701812800 18000 0 +05}. {701816400 21600 1 +05}. {717541200 18000 0 +05}. {733266000 21600 1 +05}. {748990800 18000 0 +05}. {764715600 21600 1 +05}. {780440400
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):169
                                                                                      Entropy (8bit):4.761776859195572
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8nvwFVAIgNnEYO62WFK02KQMFfh4WFKsv:SlSWB9IZaM3yHvwFVAIgZ2wK0GEJ4wKO
                                                                                      MD5:6135C39675BB0F7BB94756F2057382CF
                                                                                      SHA1:EB2C51837E721776BED5F3F1F4A014BA29DA0282
                                                                                      SHA-256:E573ADFBB9935B7D0B56FAE699160226BF3416C50EB63D8EFEB1748C4B13BF91
                                                                                      SHA-512:BC1E7C9F1F64FF7D6A50E70E62566F385A923A475E309A321FCC03964350E427A4AEE801A20B3293A289AD67E03C86B59A674F91F34238068DA6C35BBB3B4307
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Yangon)]} {. LoadTimeZoneFile Asia/Yangon.}.set TZData(:Asia/Rangoon) $TZData(:Asia/Yangon).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):142
                                                                                      Entropy (8bit):4.928343799484186
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52WFK814tXGm2OHFukevSUi9VssWYAvn:SlSWB9X52wK81Hm2OHF7ePi9V1WYAv
                                                                                      MD5:76E7F746F8663772A350A2E2C2F680C7
                                                                                      SHA1:698E3C80122AC7B9E6EF7A45F87898334A1A622E
                                                                                      SHA-256:7D2FAC4F33EE0FA667AF8A2BF8257638A37CE0308038AC02C7B5BE6E1D1E5EDD
                                                                                      SHA-512:9B1C326D3B7C89957176540AB4F856780C57C495A44F80D998A4B0C5A10F358C2F727BF160FB49D17C104B4A8EB15AC5431CCB886AC59A92E56C964D757FA3B0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Riyadh) {. {-9223372036854775808 11212 0 LMT}. {-719636812 10800 0 +03}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):183
                                                                                      Entropy (8bit):4.899371908380106
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8I65eVyVAIgN2h659Q2WFKwJ6h4WFK365ev:SlSWB9IZaM3yJAVyVAIgA4s2wKl4wKKK
                                                                                      MD5:A978C9AD6320DA94CB15324CA82C7417
                                                                                      SHA1:585C232F3FB2693C78C7831C1AF1DC25D6824CA7
                                                                                      SHA-256:73E1850BB0827043024EAFA1934190413CB36EA6FE18C90EA86B9DBC1D61EEBF
                                                                                      SHA-512:AE48BFB2A348CA992F2BCD6B1AF7495713B0526C326678309133D3271D90600624C096B4B8678AD7ECD19822E3BB24E27D12680FCA7FAA455D3CE324CE0B88ED
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Ho_Chi_Minh)]} {. LoadTimeZoneFile Asia/Ho_Chi_Minh.}.set TZData(:Asia/Saigon) $TZData(:Asia/Ho_Chi_Minh).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2044
                                                                                      Entropy (8bit):3.636696819312369
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5i1fvBHwRw/P2rFGAlODU9HOUDEChbmAP+:gDtP2rUfDEZDV1ZP+
                                                                                      MD5:265EF8FD8FB07585726D3054289A1C48
                                                                                      SHA1:DDFB1197C7A7455674AA085A6B8089124EB47689
                                                                                      SHA-256:4CCF3795EF0EF42AA09A9225370E8E1537B53A0231363077DAC385F397208669
                                                                                      SHA-512:1ACE8C173E87530FCC809814DEA779CB09ED8A277DB3B0519E57727AD3A93F3AFAFAF0F80419A8B6A8FAC1B30600716169BEAE397E34E6BE1A18D0E31DB69B3F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Sakhalin) {. {-9223372036854775808 34248 0 LMT}. {-2031039048 32400 0 +09}. {-768560400 39600 0 +12}. {354891600 43200 1 +12}. {370699200 39600 0 +11}. {386427600 43200 1 +12}. {402235200 39600 0 +11}. {417963600 43200 1 +12}. {433771200 39600 0 +11}. {449586000 43200 1 +12}. {465318000 39600 0 +11}. {481042800 43200 1 +12}. {496767600 39600 0 +11}. {512492400 43200 1 +12}. {528217200 39600 0 +11}. {543942000 43200 1 +12}. {559666800 39600 0 +11}. {575391600 43200 1 +12}. {591116400 39600 0 +11}. {606841200 43200 1 +12}. {622566000 39600 0 +11}. {638290800 43200 1 +12}. {654620400 39600 0 +11}. {670345200 36000 0 +11}. {670348800 39600 1 +11}. {686073600 36000 0 +10}. {695750400 39600 0 +12}. {701794800 43200 1 +12}. {717519600 39600 0 +11}. {733244400 43200 1 +12}. {748969200 39600 0 +11}. {764694000 43200 1 +12}. {780418800 3
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):848
                                                                                      Entropy (8bit):3.8621003155318263
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQtleA7NSYlS7hhmSQcwqSlhJS9yiIoSBHrSLUSIYdDS7/S5c3oSATo6SSYL:5hXlkhs7bqIwIoMpqDS7oXjSpL
                                                                                      MD5:6E54D9946AC13DD77FDB8EA9C4FBD989
                                                                                      SHA1:EF0A4BFD84EC369CB9581D830F20193D73187C0B
                                                                                      SHA-256:28A76A0EAF55EEC9FE7BEFF3785FDEF8C3D93AAAA2E15EE37D861E73418AC9E4
                                                                                      SHA-512:15522A5B85DCD54DC0143A38799A870268D74C8A26FED44D50A55C536D3738905597AE4F3F2AB767DE73A7EDBAE8FBF467A6014E2001FA03924C3F39E0361F27
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Samarkand) {. {-9223372036854775808 16073 0 LMT}. {-1441168073 14400 0 +04}. {-1247544000 18000 0 +05}. {354913200 21600 1 +06}. {370720800 21600 0 +06}. {386445600 18000 0 +05}. {386449200 21600 1 +05}. {402256800 18000 0 +05}. {417985200 21600 1 +05}. {433792800 18000 0 +05}. {449607600 21600 1 +05}. {465339600 18000 0 +05}. {481064400 21600 1 +05}. {496789200 18000 0 +05}. {512514000 21600 1 +05}. {528238800 18000 0 +05}. {543963600 21600 1 +05}. {559688400 18000 0 +05}. {575413200 21600 1 +05}. {591138000 18000 0 +05}. {606862800 21600 1 +05}. {622587600 18000 0 +05}. {638312400 21600 1 +05}. {654642000 18000 0 +05}. {670366800 21600 1 +05}. {686091600 18000 0 +05}. {694206000 18000 0 +05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):719
                                                                                      Entropy (8bit):4.129493275264732
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp525mdHjauvWz4aqceOcrIt04CaI8/HUYVfXzQD:cQ5edvWzJnJGIt047I8/Hp/zQD
                                                                                      MD5:7F24687F220D3B7F3C08A1F09F86BAEF
                                                                                      SHA1:2D96019AE5137935F7A43FCFD229645D656E21AF
                                                                                      SHA-256:8DBBFEEDD583DBE60E88E381D511B72DDD7AE93FEB64A2F97D6CDBF6B92A0775
                                                                                      SHA-512:BFD955BA4A284D91542D15CAE849C162D1470167D65365FF93B117D7B4361DB314ABEF5448CF5BA382002726D472FA74C3B9DD5B43CD539395FDC8241E4A0248
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Seoul) {. {-9223372036854775808 30472 0 LMT}. {-1948782472 30600 0 KST}. {-1830414600 32400 0 JST}. {-767350800 32400 0 KST}. {-498128400 30600 0 KST}. {-462702600 34200 1 KDT}. {-451733400 30600 0 KST}. {-429784200 34200 1 KDT}. {-418296600 30600 0 KST}. {-399544200 34200 1 KDT}. {-387451800 30600 0 KST}. {-368094600 34200 1 KDT}. {-356002200 30600 0 KST}. {-336645000 34200 1 KDT}. {-324552600 30600 0 KST}. {-305195400 34200 1 KDT}. {-293103000 30600 0 KST}. {-264933000 32400 0 KST}. {547578000 36000 1 KDT}. {560883600 32400 0 KST}. {579027600 36000 1 KDT}. {592333200 32400 0 KST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):887
                                                                                      Entropy (8bit):4.102844989906348
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQ8emvZMwq/Zkq/fYFq/J2Lzq/9mBq/Qq/LPq/Rq/HTq/Pjq/rzq/c2q/uq/4u:5YvZMT/d/fYc/JWG/M4/z/W/o/G/PW/f
                                                                                      MD5:D3D88F264E5E44BAA890C19A4C87A24D
                                                                                      SHA1:BA2E3F8D69D1092CE925D40FE31BEABA0DC22905
                                                                                      SHA-256:90B585115252C37625B6BCDE14708AAE003E2D6F3408D8A9034ABB6FFFD66490
                                                                                      SHA-512:14485EEC4C77DA6D7DD813A84F3F5B0DE17AE06C23FBCDB20727376C62D675ED675893B8B9A4DAAA00C21B7550F83593780CA538DB05B4ADDD4604FBCD3B0E51
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Shanghai) {. {-9223372036854775808 29143 0 LMT}. {-2177481943 28800 0 CST}. {-933667200 32400 1 CDT}. {-922093200 28800 0 CST}. {-908870400 32400 1 CDT}. {-888829200 28800 0 CST}. {-881049600 32400 1 CDT}. {-767869200 28800 0 CST}. {-745833600 32400 1 CDT}. {-733827600 28800 0 CST}. {-716889600 32400 1 CDT}. {-699613200 28800 0 CST}. {-683884800 32400 1 CDT}. {-670669200 28800 0 CST}. {-652348800 32400 1 CDT}. {-650016000 28800 0 CST}. {515527200 32400 1 CDT}. {527014800 28800 0 CST}. {545162400 32400 1 CDT}. {558464400 28800 0 CST}. {577216800 32400 1 CDT}. {589914000 28800 0 CST}. {608666400 32400 1 CDT}. {621968400 28800 0 CST}. {640116000 32400 1 CDT}. {653418000 28800 0 CST}. {671565600 32400 1 CDT}. {684867600 28800 0 CST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):359
                                                                                      Entropy (8bit):4.370799489849578
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKfbdJm2OHxdPmIWOb/MVSYv/1MesF5X8dSMd0dMVSSm8kvScCvCIMY:MBp52nbdJmdHDPxDTMF/wFZMxcHClMxi
                                                                                      MD5:DFABB80419B69BE34B2FCD475CFDFE22
                                                                                      SHA1:2CF4F330E00397020328BCE28449B9F63E17067D
                                                                                      SHA-256:B251FBDB0DB4ACBB3855063C32681A5F32E609FA3AA0DDC43225D056D07CB2D3
                                                                                      SHA-512:EB362B7D0C5A4F1C605A8F2533A5CCAFCFA1F4D3B0F48C417CEA8C492834FE36822A75C726659786CBD4D5A544376D806E6BA8E952607997FBDDAF84E343B353
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Singapore) {. {-9223372036854775808 24925 0 LMT}. {-2177477725 24925 0 SMT}. {-2038200925 25200 0 +07}. {-1167634800 26400 1 +0720}. {-1073028000 26400 0 +0720}. {-894180000 27000 0 +0730}. {-879665400 32400 0 +09}. {-767005200 27000 0 +0730}. {378664200 28800 0 +08}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1993
                                                                                      Entropy (8bit):3.7026922613316886
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQHOedtdvBOCdwdVdptQvMCTP2rF1gCzlODU9xE305r/CXVWWHs/gSNknK:5HxvBHwRw/P2rFGAlODU9PZUEWQgmkK
                                                                                      MD5:0F445767A84A429787070F7CCFB4D35B
                                                                                      SHA1:B524665DAC57E53A6D9A5386B5AEAAE52BD405A5
                                                                                      SHA-256:07F4857391E114D4B958C02B8FF72BEBCED72AA730F4F4B09F68F57349473503
                                                                                      SHA-512:8FE2AC4C1DCA60E597633377EF1F1C38EE027B7893DB77BA912F294B9B791B6762E62E87DAC17171B15629DD45BD7960D25ADAE96827DAB63FAA80E0956A8C80
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Srednekolymsk) {. {-9223372036854775808 36892 0 LMT}. {-1441188892 36000 0 +10}. {-1247565600 39600 0 +12}. {354891600 43200 1 +12}. {370699200 39600 0 +11}. {386427600 43200 1 +12}. {402235200 39600 0 +11}. {417963600 43200 1 +12}. {433771200 39600 0 +11}. {449586000 43200 1 +12}. {465318000 39600 0 +11}. {481042800 43200 1 +12}. {496767600 39600 0 +11}. {512492400 43200 1 +12}. {528217200 39600 0 +11}. {543942000 43200 1 +12}. {559666800 39600 0 +11}. {575391600 43200 1 +12}. {591116400 39600 0 +11}. {606841200 43200 1 +12}. {622566000 39600 0 +11}. {638290800 43200 1 +12}. {654620400 39600 0 +11}. {670345200 36000 0 +11}. {670348800 39600 1 +11}. {686073600 36000 0 +10}. {695750400 39600 0 +12}. {701794800 43200 1 +12}. {717519600 39600 0 +11}. {733244400 43200 1 +12}. {748969200 39600 0 +11}. {764694000 43200 1 +12}. {78041
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1298
                                                                                      Entropy (8bit):3.983254382416919
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQXbe9Z+zuzq/9mBq/Qq/LPq/wO3q/uq/PC9q/hq/Rq/Gq/fq/Aq/Vtyq/fQH+zp:5XwoKG/M4/z/W/Ta/1/V/Y/o/d/y/D/t
                                                                                      MD5:16CF8E32D5B2933CE5A0F2F90B8090BA
                                                                                      SHA1:F899656FE3FDDD5F63B18D4800F909CD2DA6A151
                                                                                      SHA-256:E098A0A94ED53EC471841CDF6995AEF1F3A2699EDC143FF5DBDA7CB0AFD3FD6C
                                                                                      SHA-512:4856AC8AE2BB0C8856A87C5E46AD478E697AACB46B8679870FD581706802772D333FEA5D1D840BDDB1EAB3B4FDD46883CFD2EC4017F9E5C06CAF2A24539FA808
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Taipei) {. {-9223372036854775808 29160 0 LMT}. {-2335248360 28800 0 CST}. {-1017820800 32400 0 JST}. {-766224000 28800 0 CST}. {-745833600 32400 1 CDT}. {-733827600 28800 0 CST}. {-716889600 32400 1 CDT}. {-699613200 28800 0 CST}. {-683884800 32400 1 CDT}. {-670669200 28800 0 CST}. {-652348800 32400 1 CDT}. {-639133200 28800 0 CST}. {-620812800 32400 1 CDT}. {-607597200 28800 0 CST}. {-589276800 32400 1 CDT}. {-576061200 28800 0 CST}. {-562924800 32400 1 CDT}. {-541760400 28800 0 CST}. {-528710400 32400 1 CDT}. {-510224400 28800 0 CST}. {-497174400 32400 1 CDT}. {-478688400 28800 0 CST}. {-465638400 32400 1 CDT}. {-449830800 28800 0 CST}. {-434016000 32400 1 CDT}. {-418208400 28800 0 CST}. {-402480000 32400 1 CDT}. {-386672400 28800 0 CST}. {-370944000 32400 1 CDT}. {-355136400 28800 0 CST}. {-339408000 32400 1 CDT}. {-323600400 2
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):847
                                                                                      Entropy (8bit):3.8433853520749905
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQZeQlNRSsOXEFCMiq90DIgb5j6gMJR/4TJTXSATo6SSYL:5HpFqq9iTVrXjSpL
                                                                                      MD5:24587E02A79D02973DE32E4CDACBE84C
                                                                                      SHA1:41B8CA1CAE10A9340359317EC8DD16C8637C0F1A
                                                                                      SHA-256:46C2D8E86BACFDB8280862AD9E28F7A0867740726EF21D08138C9F9A900CC1E9
                                                                                      SHA-512:07C939DCD5AB0DA3D3667D0D56421C6B40598C6DAB9641664E0ABB2CE4CC4562B10853C88DB51FBA5D1ED733E86193E88CE8984130FFF83955BD9335A59CF031
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tashkent) {. {-9223372036854775808 16631 0 LMT}. {-1441168631 18000 0 +05}. {-1247547600 21600 0 +06}. {354909600 25200 1 +06}. {370717200 21600 0 +06}. {386445600 25200 1 +06}. {402253200 21600 0 +06}. {417981600 25200 1 +06}. {433789200 21600 0 +06}. {449604000 25200 1 +06}. {465336000 21600 0 +06}. {481060800 25200 1 +06}. {496785600 21600 0 +06}. {512510400 25200 1 +06}. {528235200 21600 0 +06}. {543960000 25200 1 +06}. {559684800 21600 0 +06}. {575409600 25200 1 +06}. {591134400 21600 0 +06}. {606859200 25200 1 +06}. {622584000 21600 0 +06}. {638308800 25200 1 +06}. {654638400 21600 0 +06}. {670363200 18000 0 +05}. {670366800 21600 1 +05}. {686091600 18000 0 +05}. {694206000 18000 0 +05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1669
                                                                                      Entropy (8bit):3.588597734517364
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQyGeHLQqpkb/cXXn8UDu5u8WmFeb/RLc9qENkw/ybt8i9E60339UyYU7s9UU7UT:5+YTVOZmF7N76eHj2QqzM
                                                                                      MD5:EEA5CEEDA499381B331676CF2D3B1189
                                                                                      SHA1:BC1D3871CC170F0BCBAE567C0D934CC131A7E410
                                                                                      SHA-256:260F3F9A9209170AC02961E881F02AA6D6C720BAACC29756CF1CC730FACCF662
                                                                                      SHA-512:0E8FF6B4EF0E102152B20D3C819F2673B6426B3D56DF42F89F44EB4467D0CA45F3D49B6564DA6FCB88BDB1887AF39382766F75FE3A3977CFB4408E06C6D1C062
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tbilisi) {. {-9223372036854775808 10751 0 LMT}. {-2840151551 10751 0 TBMT}. {-1441162751 10800 0 +03}. {-405140400 14400 0 +04}. {354916800 18000 1 +04}. {370724400 14400 0 +04}. {386452800 18000 1 +04}. {402260400 14400 0 +04}. {417988800 18000 1 +04}. {433796400 14400 0 +04}. {449611200 18000 1 +04}. {465343200 14400 0 +04}. {481068000 18000 1 +04}. {496792800 14400 0 +04}. {512517600 18000 1 +04}. {528242400 14400 0 +04}. {543967200 18000 1 +04}. {559692000 14400 0 +04}. {575416800 18000 1 +04}. {591141600 14400 0 +04}. {606866400 18000 1 +04}. {622591200 14400 0 +04}. {638316000 18000 1 +04}. {654645600 14400 0 +04}. {670370400 10800 0 +03}. {670374000 14400 1 +03}. {686098800 10800 0 +03}. {694213200 10800 0 +03}. {701816400 14400 1 +03}. {717537600 10800 0 +03}. {733266000 14400 1 +03}. {748987200 10800 0 +03}. {764715600
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7021
                                                                                      Entropy (8bit):3.4346704245463338
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:BboVQCKYJ4cRvxoIDCMcuzf8mmU6gjilpM1Bdy6XaqYx7u0kLBT8U2nTEA4n8t/s:exqcFOIDCMcMrPqpIB8f9ZkF0EIk
                                                                                      MD5:E179D37382F44D866D495F5D38FD5D88
                                                                                      SHA1:35C5BFFE89795786B7ED0BB3B7822666D6BFCB5B
                                                                                      SHA-256:41F1DBB61094C00E2424E22780930258BC99A71D182E7A181065B0A1A57306F1
                                                                                      SHA-512:AF1A4AB0BD690F038EBC3AA5CB2CAEE575E639B4504E3BEBC8E1DE85081C780744CBAD5871D62D4F028314D165B4D71E9B3D0B68019FE9D1E49D702101602431
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tehran) {. {-9223372036854775808 12344 0 LMT}. {-1704165944 12344 0 TMT}. {-757394744 12600 0 +0330}. {247177800 14400 0 +04}. {259272000 18000 1 +04}. {277758000 14400 0 +04}. {283982400 12600 0 +0330}. {290809800 16200 1 +0330}. {306531000 12600 0 +0330}. {322432200 16200 1 +0330}. {338499000 12600 0 +0330}. {673216200 16200 1 +0330}. {685481400 12600 0 +0330}. {701209800 16200 1 +0330}. {717103800 12600 0 +0330}. {732745800 16200 1 +0330}. {748639800 12600 0 +0330}. {764281800 16200 1 +0330}. {780175800 12600 0 +0330}. {795817800 16200 1 +0330}. {811711800 12600 0 +0330}. {827353800 16200 1 +0330}. {843247800 12600 0 +0330}. {858976200 16200 1 +0330}. {874870200 12600 0 +0330}. {890512200 16200 1 +0330}. {906406200 12600 0 +0330}. {922048200 16200 1 +0330}. {937942200 12600 0 +0330}. {953584200 16200 1 +0330}. {969478200 12600 0 +
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.82789113675599
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq85zFFwVAIgN0AzFzt2WFK+TT52WFKYzFp:SlSWB9IZaM3yZbwVAIgCAb2wKsswKY7
                                                                                      MD5:D044282CC9B9F531D8136612B4AA938D
                                                                                      SHA1:5FD01E48BFFC2B54BBA48926EFD2137A91B57E0F
                                                                                      SHA-256:FE57D86184A7F4A64F3555DE3F4463531A86BB18F124534F17B09FAB825F83B4
                                                                                      SHA-512:DBBA54D68F33E51D51E816D79D83B61490BD31262DFF6037C0834BADA48CBC02F4281203D7212EDF6D96F7FF1EF3843299698BF0DFE10B5F1383AA504594505A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Jerusalem)]} {. LoadTimeZoneFile Asia/Jerusalem.}.set TZData(:Asia/Tel_Aviv) $TZData(:Asia/Jerusalem).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):171
                                                                                      Entropy (8bit):4.858169634371472
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8kNZ4pVAIgNqFNzO62WFK9Z752WFKvNZvn:SlSWB9IZaM3ykZ4pVAIgc3K62wKf12wc
                                                                                      MD5:B678D97B4E6E6112299746833C06C70B
                                                                                      SHA1:A49BD45DB59BDD3B7BF9159699272389E8EF77AC
                                                                                      SHA-256:6AEAE87CAD7FE358A5A1BABE6C0244A3F89403FC64C5AA19E1FFDEDCEB6CF57B
                                                                                      SHA-512:BEA10EAE5941E027D8FE9E5D5C03FAE5DCFEF7603088E71CA7CCD0461851E175AE1CC7592DFBEC63F91D840E4E0AA04B54549EB71303666E6EA16AFFF6EDA058
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Thimphu)]} {. LoadTimeZoneFile Asia/Thimphu.}.set TZData(:Asia/Thimbu) $TZData(:Asia/Thimphu).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.838482422690701
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52WFKvNZLXGm2OHEQUTFnvSVaJKuc/v6QzFtV9gmZVFSTL:SlSWB9X52wKVZCm2OHEfnjKuc/SQnV9y
                                                                                      MD5:A52B235D91207E823482EEC1EE8C6433
                                                                                      SHA1:84826EAC8043739256E34D828D6BE8E17172A8F8
                                                                                      SHA-256:21CE1FAEDD45DED62E78D6DB24F47ED9DEC5642E4A4D7ADDF85B33F8AB82D8CA
                                                                                      SHA-512:08E8C68BF6BE5E876A59130C207D4911732EBA0F4E72603213A0AD0CC5DA8EF6AC6389AF8A0781F01B0E72CA030C9A47C46CC0FB422F5C0104A7365D818A4EB9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Thimphu) {. {-9223372036854775808 21516 0 LMT}. {-706341516 19800 0 +0530}. {560025000 21600 0 +06}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):374
                                                                                      Entropy (8bit):4.405484223376936
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKvm2OHOx5PvYvmoZsOXzvmof67zd6avmoFc87e+zvmT0TgvmL:MBp52XmdHOx5PAbZ3zbi7xtbFD7e+zou
                                                                                      MD5:4549B66A26A96C10DB196B8957BB6127
                                                                                      SHA1:B2B96699AE70CA47F2B180B9AEF8FB9864AE98A1
                                                                                      SHA-256:EC533BBE242CE6A521BAED1D37E0DD0247A37FE8D36D25205520B93CF51E4595
                                                                                      SHA-512:A6C147DF80BB6D41877AD99673C49FF6AD5C1C03B587D71A70C8F7BD8D321817D9E99BFAE11F7F7C27C1A7563C9A101B6C3E65D962B3524C95113A807720ED4E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tokyo) {. {-9223372036854775808 33539 0 LMT}. {-2587712400 32400 0 JST}. {-683802000 36000 1 JDT}. {-672310800 32400 0 JST}. {-654771600 36000 1 JDT}. {-640861200 32400 0 JST}. {-620298000 36000 1 JDT}. {-609411600 32400 0 JST}. {-588848400 36000 1 JDT}. {-577962000 32400 0 JST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2043
                                                                                      Entropy (8bit):3.6031458640952554
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:539i17A9/IJ4vQayW+dRvV8YzXJIq79Af3AuyqM7FfiC/LIcy9zU9Muq2PIX/9se:ijFRRCfQucXsQk7TQy
                                                                                      MD5:436E5AA70DD662E337E0144558EA277B
                                                                                      SHA1:E268AAD83CE3CC32CB23647E961509EBB4C8AA2C
                                                                                      SHA-256:9917B2A1BFAAD1378B90879C92F157BD7912A4072BE21A2A4CB366A38F310D3B
                                                                                      SHA-512:C714CFBB58170E2291A78AD4F725613049BC9D52DB9F8685803E8F7E181D7E0C2AAF7E603D29243D2E5F4F1D8A3B0272559E7CBCB51736A8115A44E6D56FA7CC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Tomsk) {. {-9223372036854775808 20391 0 LMT}. {-1578807591 21600 0 +06}. {-1247551200 25200 0 +08}. {354906000 28800 1 +08}. {370713600 25200 0 +07}. {386442000 28800 1 +08}. {402249600 25200 0 +07}. {417978000 28800 1 +08}. {433785600 25200 0 +07}. {449600400 28800 1 +08}. {465332400 25200 0 +07}. {481057200 28800 1 +08}. {496782000 25200 0 +07}. {512506800 28800 1 +08}. {528231600 25200 0 +07}. {543956400 28800 1 +08}. {559681200 25200 0 +07}. {575406000 28800 1 +08}. {591130800 25200 0 +07}. {606855600 28800 1 +08}. {622580400 25200 0 +07}. {638305200 28800 1 +08}. {654634800 25200 0 +07}. {670359600 21600 0 +07}. {670363200 25200 1 +07}. {686088000 21600 0 +06}. {695764800 25200 0 +08}. {701809200 28800 1 +08}. {717534000 25200 0 +07}. {733258800 28800 1 +08}. {748983600 25200 0 +07}. {764708400 28800 1 +08}. {780433200 252
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.8489855608543575
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8pYFwVAIgNzB0L2WFKPQOrFJ4WFKvn:SlSWB9IZaM3yWFwVAIg8L2wKPQOrFJ4H
                                                                                      MD5:AF91CF42CFBA12F55AF3E6D26A71946D
                                                                                      SHA1:673AC77D4E5B6ED7CE8AE67975372462F6AF870B
                                                                                      SHA-256:D9BCAE393D4B9EE5F308FA0C26A7A6BCE716E77DB056E75A3B39B33A227760C8
                                                                                      SHA-512:1FD61EA39FF08428486E07AF4404CEA67ACCCB600F11BA74B340A4F663EB8221BC7BF84AE677566F7DDEC0CB42F1946614CD11A9CD7824E0D6CAA804DF0EF514
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Makassar)]} {. LoadTimeZoneFile Asia/Makassar.}.set TZData(:Asia/Ujung_Pandang) $TZData(:Asia/Makassar).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1535
                                                                                      Entropy (8bit):3.6833061173791726
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQlTer9uN1xJSIA+SN16zSacGjSvtHpS9xZzS1ZjSnZS3owShjS+5MzSDZmSA/SN:569YXoIA9N0+acGuRIvc1Zun43oDhu+x
                                                                                      MD5:9C497C3C57F4FEE50C6BF35D0A3A7E5F
                                                                                      SHA1:FAFB3456CADE6AD6FFBADC699AB882FAE2591739
                                                                                      SHA-256:19855D4B0EEF8CD85D502262DF7B7F15B069B1A4D169FAB0F20F803C598C1D83
                                                                                      SHA-512:255CDF3333789771240A37CECBEB87EEAAE4561616A7066C935B67B8CA930F026F68A82315083190B175C54FBB4B2DB0126F25FDDD6C09DC374E09833225DFB8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Ulaanbaatar) {. {-9223372036854775808 25652 0 LMT}. {-2032931252 25200 0 +07}. {252435600 28800 0 +08}. {417974400 32400 1 +08}. {433782000 28800 0 +08}. {449596800 32400 1 +08}. {465318000 28800 0 +08}. {481046400 32400 1 +08}. {496767600 28800 0 +08}. {512496000 32400 1 +08}. {528217200 28800 0 +08}. {543945600 32400 1 +08}. {559666800 28800 0 +08}. {575395200 32400 1 +08}. {591116400 28800 0 +08}. {606844800 32400 1 +08}. {622566000 28800 0 +08}. {638294400 32400 1 +08}. {654620400 28800 0 +08}. {670348800 32400 1 +08}. {686070000 28800 0 +08}. {701798400 32400 1 +08}. {717519600 28800 0 +08}. {733248000 32400 1 +08}. {748969200 28800 0 +08}. {764697600 32400 1 +08}. {780418800 28800 0 +08}. {796147200 32400 1 +08}. {811868400 28800 0 +08}. {828201600 32400 1 +08}. {843922800 28800 0 +08}. {859651200 32400 1 +08}. {875372400
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):187
                                                                                      Entropy (8bit):4.675919405724711
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8TcXHVAIgNrfcXKxL2WFKhrMEBQWFKucXu:SlSWB9IZaM3yIVAIg7xL2wKhrMEewKI
                                                                                      MD5:73C6A7BC088A3CD92CAC2F8B019994A0
                                                                                      SHA1:74D5DCE1100F6C97DFCFAD5EFC310196F03ABED5
                                                                                      SHA-256:8F075ACF5FF86E5CDE63E178F7FCB692C209B6023C80157A2ABF6826AE63C6C3
                                                                                      SHA-512:4EAD916D2251CF3A9B336448B467282C251EE5D98299334F365711CCA8CAF9CA83600503A3346AEC9DFA9E9AF064BA6DEF570BABCC48AE5EB954DBF574A769B2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Ulaanbaatar)]} {. LoadTimeZoneFile Asia/Ulaanbaatar.}.set TZData(:Asia/Ulan_Bator) $TZData(:Asia/Ulaanbaatar).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):143
                                                                                      Entropy (8bit):4.962709386113539
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52WFKjmcXGm2OHEVPvUWA0GVFSTL:SlSWB9X52wKjmTm2OHEVPXA0CUn
                                                                                      MD5:6E79B04FC6FE96C90277593719BECD36
                                                                                      SHA1:81798A9F349A7DEAF9218A21B8C2D8A3E641E9B7
                                                                                      SHA-256:A73686D7BF4EE44DC7BBD1CAAF2D212D7D12478F1521BF5A628EDBEA79B99725
                                                                                      SHA-512:F6781EDA72F4B62FE128332AC2B6BDDFFF6E94DF79914C467C2A30BBE05ABE005B23C0F8A5682095FA874CB3787BD499DBBA8F1644515B6914180A68C9AB6066
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Urumqi) {. {-9223372036854775808 21020 0 LMT}. {-1325483420 21600 0 +06}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1987
                                                                                      Entropy (8bit):3.684365782602096
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQueIlfR30vBOCdwdVdptQvMCTP2rF1gCzlODU9xE305r/CXVWWHs/gSNknhT:5YJkvBHwRw/P2rFGAlODU9PZUEWQgmkl
                                                                                      MD5:F648B8CDF0F44BF2733AD480D91602C2
                                                                                      SHA1:FCDB62F1D2781836AAAFF1C1B651E91A8E79A901
                                                                                      SHA-256:C94B072DDB28C27AAA936D27D5A2F1400E47E8BBFCB3EF370BF2C7252E69FB98
                                                                                      SHA-512:39E793B707C2EEF99BAE8E926A1C8CAF4A1989F71842C348A5819CC4BE3D6DC81D2781BF20CB95631EC532A345B7CD41BA88505B301CA7928E676F55252C6DDD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Ust-Nera) {. {-9223372036854775808 34374 0 LMT}. {-1579426374 28800 0 +08}. {354898800 43200 0 +12}. {370699200 39600 0 +11}. {386427600 43200 1 +12}. {402235200 39600 0 +11}. {417963600 43200 1 +12}. {433771200 39600 0 +11}. {449586000 43200 1 +12}. {465318000 39600 0 +11}. {481042800 43200 1 +12}. {496767600 39600 0 +11}. {512492400 43200 1 +12}. {528217200 39600 0 +11}. {543942000 43200 1 +12}. {559666800 39600 0 +11}. {575391600 43200 1 +12}. {591116400 39600 0 +11}. {606841200 43200 1 +12}. {622566000 39600 0 +11}. {638290800 43200 1 +12}. {654620400 39600 0 +11}. {670345200 36000 0 +11}. {670348800 39600 1 +11}. {686073600 36000 0 +10}. {695750400 39600 0 +12}. {701794800 43200 1 +12}. {717519600 39600 0 +11}. {733244400 43200 1 +12}. {748969200 39600 0 +11}. {764694000 43200 1 +12}. {780418800 39600 0 +11}. {796143600 43
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):174
                                                                                      Entropy (8bit):4.808435832735883
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8VLYO5YFwVAIgN8ELYOAvN2WFKgTjEHp4WFKELYOun:SlSWB9IZaM3y1LewVAIgKELUvN2wKgsI
                                                                                      MD5:6372DA942647071A0514AEBF0AFEB7C7
                                                                                      SHA1:C9FB6B05DA246224D5EB016035AB905657B9D3FA
                                                                                      SHA-256:7B1A3F36E9A12B850DC06595AAE6294FAEAC98AD933B3327B866E83C0E9A1999
                                                                                      SHA-512:DC7D8753AD0D6908CA8765623EC1C4E4717833D183435957BB43E7ADB8A0D078F87319408F4C1D284CFB24BE010141B3254A36EF50C5DDCC59D7DEE5B3E33B7F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Bangkok)]} {. LoadTimeZoneFile Asia/Bangkok.}.set TZData(:Asia/Vientiane) $TZData(:Asia/Bangkok).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1991
                                                                                      Entropy (8bit):3.617868789838068
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQ6EeBGZKFyW3bEH6i4bfwRpiTQNuTHDMOFOnJfioEkfhbZUAPQ:56aZWf3bw6HfavuLoOUDEChbmAPQ
                                                                                      MD5:589D58D0819C274BD76648B290E3B6A7
                                                                                      SHA1:8EF67425A86E1663263C380B81C878EFEE107261
                                                                                      SHA-256:F7CA7543A15D0EA7380552E9CA4506E1527D5A0C9081B21A6A6CAEAD51085293
                                                                                      SHA-512:38A4264039866E82CC2CCAF52FF1AB3384A72AD9F2FF0060FC49B3D2C09CB072700F28F2CA3A0850B3E5BAB62F6AA6031ECAB2EAB09EB08833D8CD778B338BDD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Vladivostok) {. {-9223372036854775808 31651 0 LMT}. {-1487321251 32400 0 +09}. {-1247562000 36000 0 +11}. {354895200 39600 1 +11}. {370702800 36000 0 +10}. {386431200 39600 1 +11}. {402238800 36000 0 +10}. {417967200 39600 1 +11}. {433774800 36000 0 +10}. {449589600 39600 1 +11}. {465321600 36000 0 +10}. {481046400 39600 1 +11}. {496771200 36000 0 +10}. {512496000 39600 1 +11}. {528220800 36000 0 +10}. {543945600 39600 1 +11}. {559670400 36000 0 +10}. {575395200 39600 1 +11}. {591120000 36000 0 +10}. {606844800 39600 1 +11}. {622569600 36000 0 +10}. {638294400 39600 1 +11}. {654624000 36000 0 +10}. {670348800 32400 0 +10}. {670352400 36000 1 +10}. {686077200 32400 0 +09}. {695754000 36000 0 +11}. {701798400 39600 1 +11}. {717523200 36000 0 +10}. {733248000 39600 1 +11}. {748972800 36000 0 +10}. {764697600 39600 1 +11}. {7804224
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1987
                                                                                      Entropy (8bit):3.6163895181017764
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQVe7Ox4ER6oziDpiKXtyiyzilUBinUijiRziiiaSiYzYWk2HgQiMhNIziPiRikL:5Q+9InX4n7m84nPIzOtfjQhGT+
                                                                                      MD5:29C007E4E3E0015DBF39D78DF39CB790
                                                                                      SHA1:C3311ED4D7774A7DC14E0436D0B90C88ADD9BDA5
                                                                                      SHA-256:C2DD93EEAFC3E2FD6CCE0EED0633C40D8BF34331760D23A75ADCEA1719A11AE6
                                                                                      SHA-512:24609B8C01F3420CC19CA8F5AC78867DCAD1DD1A09A4B1C5356F90F0041BBCA322BC0C64D5DE4F565331674CFE15B7BF66AF6B69ACE9D18765A91B044962F781
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Yakutsk) {. {-9223372036854775808 31138 0 LMT}. {-1579423138 28800 0 +08}. {-1247558400 32400 0 +10}. {354898800 36000 1 +10}. {370706400 32400 0 +09}. {386434800 36000 1 +10}. {402242400 32400 0 +09}. {417970800 36000 1 +10}. {433778400 32400 0 +09}. {449593200 36000 1 +10}. {465325200 32400 0 +09}. {481050000 36000 1 +10}. {496774800 32400 0 +09}. {512499600 36000 1 +10}. {528224400 32400 0 +09}. {543949200 36000 1 +10}. {559674000 32400 0 +09}. {575398800 36000 1 +10}. {591123600 32400 0 +09}. {606848400 36000 1 +10}. {622573200 32400 0 +09}. {638298000 36000 1 +10}. {654627600 32400 0 +09}. {670352400 28800 0 +09}. {670356000 32400 1 +09}. {686080800 28800 0 +08}. {695757600 32400 0 +10}. {701802000 36000 1 +10}. {717526800 32400 0 +09}. {733251600 36000 1 +10}. {748976400 32400 0 +09}. {764701200 36000 1 +10}. {780426000 3
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):235
                                                                                      Entropy (8bit):4.635396864572362
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52wKsCm2OHGVQPZN6FCm+UlDVkvScChY/s5Uq:MBp52zmdHGuPZNAkHCpr
                                                                                      MD5:12B1D08ED6DFAB647D8F1D1371D771F6
                                                                                      SHA1:2AC1CE6E85533D6B99A8E9725F43A867833B956E
                                                                                      SHA-256:DCC9323EF236D2E3B6DAA296EB14B9208754FCD449D2351067201BCEC15381A2
                                                                                      SHA-512:C563B6A3F1B21B5FFD0F092CAF6344D5A6D74F5AC03DA44DCA6FB1B4BC0D321C6E0E8F315248D41C0D1D0FFD35F8DE31D96FBD4AE1CFE15DA52E40EE3FF7F8E3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Yangon) {. {-9223372036854775808 23087 0 LMT}. {-2840163887 23087 0 RMT}. {-1577946287 23400 0 +0630}. {-873268200 32400 0 +09}. {-778410000 23400 0 +0630}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2023
                                                                                      Entropy (8bit):3.6129679767742124
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:5iKkhr7YqXZIoLybDNUoXKXmpsuNjcgy8TmQ28N7Wdw+5vDT7L:w2xd8kCdf
                                                                                      MD5:9C578B55160C4CDE22E0CD3AE449AA89
                                                                                      SHA1:DAEB24B867A835AA97E7E6A67C1AD4278015D6BB
                                                                                      SHA-256:924E60D3C57F296CDEA175D4E970FF3C68A92ADBBBA23EF37B76D7AD5D41DCE9
                                                                                      SHA-512:E3F2798038F897DF5D1D112F294BFD4E3FDBFCF4D568C4038C85289F84E0844010A6C88659C4B9D94720DBB680F2628CECEB17E6C6D0DFC231E6DCBA75068458
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Yekaterinburg) {. {-9223372036854775808 14553 0 LMT}. {-1688270553 13505 0 PMT}. {-1592610305 14400 0 +04}. {-1247544000 18000 0 +06}. {354913200 21600 1 +06}. {370720800 18000 0 +05}. {386449200 21600 1 +06}. {402256800 18000 0 +05}. {417985200 21600 1 +06}. {433792800 18000 0 +05}. {449607600 21600 1 +06}. {465339600 18000 0 +05}. {481064400 21600 1 +06}. {496789200 18000 0 +05}. {512514000 21600 1 +06}. {528238800 18000 0 +05}. {543963600 21600 1 +06}. {559688400 18000 0 +05}. {575413200 21600 1 +06}. {591138000 18000 0 +05}. {606862800 21600 1 +06}. {622587600 18000 0 +05}. {638312400 21600 1 +06}. {654642000 18000 0 +05}. {670366800 14400 0 +05}. {670370400 18000 1 +05}. {686095200 14400 0 +04}. {695772000 18000 0 +06}. {701816400 21600 1 +06}. {717541200 18000 0 +05}. {733266000 21600 1 +06}. {748990800 18000 0 +05}. {764
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1959
                                                                                      Entropy (8bit):3.554930605948629
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQO4LeuVrqpkb/cXXn8UDu5u8WmFeb/RLc9qENkw/ybt8i9E60339UyuUgUU2heQ:5x79TVOZmF7N76eHvdSB4tJFFWmvN
                                                                                      MD5:013DD03BE28257101FC72E3294709AC6
                                                                                      SHA1:2EBBB3DA858B1BBC0C3CDFCBED3A4BAA0D6CE1B2
                                                                                      SHA-256:15CBC98425C074D9D5D1B107483BF68C75C318C240C7CDBDA390F8D102D76D53
                                                                                      SHA-512:10A651C82E6D5386FDC1FC95EF15F1CB0A4D8850A2324E7D62F63E1D3FBA87812045FFCF1DF013D7A3E90BBF514A4C5B2B23C547905737193B369644986D6A42
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Asia/Yerevan) {. {-9223372036854775808 10680 0 LMT}. {-1441162680 10800 0 +03}. {-405140400 14400 0 +04}. {354916800 18000 1 +04}. {370724400 14400 0 +04}. {386452800 18000 1 +04}. {402260400 14400 0 +04}. {417988800 18000 1 +04}. {433796400 14400 0 +04}. {449611200 18000 1 +04}. {465343200 14400 0 +04}. {481068000 18000 1 +04}. {496792800 14400 0 +04}. {512517600 18000 1 +04}. {528242400 14400 0 +04}. {543967200 18000 1 +04}. {559692000 14400 0 +04}. {575416800 18000 1 +04}. {591141600 14400 0 +04}. {606866400 18000 1 +04}. {622591200 14400 0 +04}. {638316000 18000 1 +04}. {654645600 14400 0 +04}. {670370400 10800 0 +03}. {670374000 14400 1 +03}. {686098800 10800 0 +03}. {701823600 14400 1 +03}. {717548400 10800 0 +03}. {733273200 14400 1 +03}. {748998000 10800 0 +03}. {764722800 14400 1 +03}. {780447600 10800 0 +03}. {796172400 14
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9474
                                                                                      Entropy (8bit):3.4598088631836625
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Mw7Jfsud5vCGy0luUDHaXZgsN/FWVFjHv0:Mwdf/d5vCGy0luZN9WVFjHv0
                                                                                      MD5:E9C33EAACFD20C021CE94292068CC1D8
                                                                                      SHA1:9F8C0A4E07C33349C6ACDB0564771AEB11098B9D
                                                                                      SHA-256:8E2B427733BF8DBCE5171DC57F0892F0987CF1BD7941DA40048CB53B86B23E0D
                                                                                      SHA-512:8C77CF236855C51E03911A8203A2E81FC728C21A904B4962EA18F5FD39B00174D8A365FC0CA42E4EDE12DA84DD6445CFBB1B3E922189EB6B13AF6BC802E2B405
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Azores) {. {-9223372036854775808 -6160 0 LMT}. {-2713904240 -6872 0 HMT}. {-1830376800 -7200 0 -02}. {-1689548400 -3600 1 -01}. {-1677794400 -7200 0 -02}. {-1667430000 -3600 1 -01}. {-1647730800 -7200 0 -02}. {-1635807600 -3600 1 -01}. {-1616194800 -7200 0 -02}. {-1604358000 -3600 1 -01}. {-1584658800 -7200 0 -02}. {-1572735600 -3600 1 -01}. {-1553036400 -7200 0 -02}. {-1541199600 -3600 1 -01}. {-1521500400 -7200 0 -02}. {-1442444400 -3600 1 -01}. {-1426806000 -7200 0 -02}. {-1379286000 -3600 1 -01}. {-1364770800 -7200 0 -02}. {-1348441200 -3600 1 -01}. {-1333321200 -7200 0 -02}. {-1316386800 -3600 1 -01}. {-1301266800 -7200 0 -02}. {-1284332400 -3600 1 -01}. {-1269817200 -7200 0 -02}. {-1221433200 -3600 1 -01}. {-1206918000 -7200 0 -02}. {-1191193200 -3600 1 -01}. {-1175468400 -7200 0 -02}. {-1127689200 -3600 1 -01}. {-111196440
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7684
                                                                                      Entropy (8bit):3.7376923223964162
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:UdPvxrPGgFEUlpde9pXbO53oVmM7IEc2fVGYu2yeB/T/eleWmBk81kS/kV6kef4E:lJv
                                                                                      MD5:E55A91A96E1DC267AAEFAF27866F0A90
                                                                                      SHA1:A3E8DB332114397F4F487256E9168E73784D3637
                                                                                      SHA-256:A2EB47B25B3A389907DD242C86288073B0694B030B244CCF90421C0B510267BD
                                                                                      SHA-512:9A8140365D76F1A83A98A35593638F2C047B3D2B1E9D0F6ACB2B321EBDB9CC5B6C8CCD3C110B127A12DCDB7D9ED16A8F7DB7DA7A8B4587486D060FACCA23F993
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Bermuda) {. {-9223372036854775808 -15558 0 LMT}. {-1262281242 -14400 0 AST}. {136360800 -10800 0 ADT}. {152082000 -14400 0 AST}. {167810400 -10800 1 ADT}. {183531600 -14400 0 AST}. {189316800 -14400 0 AST}. {199260000 -10800 1 ADT}. {215586000 -14400 0 AST}. {230709600 -10800 1 ADT}. {247035600 -14400 0 AST}. {262764000 -10800 1 ADT}. {278485200 -14400 0 AST}. {294213600 -10800 1 ADT}. {309934800 -14400 0 AST}. {325663200 -10800 1 ADT}. {341384400 -14400 0 AST}. {357112800 -10800 1 ADT}. {372834000 -14400 0 AST}. {388562400 -10800 1 ADT}. {404888400 -14400 0 AST}. {420012000 -10800 1 ADT}. {436338000 -14400 0 AST}. {452066400 -10800 1 ADT}. {467787600 -14400 0 AST}. {483516000 -10800 1 ADT}. {499237200 -14400 0 AST}. {514965600 -10800 1 ADT}. {530686800 -14400 0 AST}. {544600800 -10800 1 ADT}. {562136400 -14400 0 AST}. {576050
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6609
                                                                                      Entropy (8bit):3.7165368441152715
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:KXu/30NSfAewvtj544IrvfMS4pBs6nLUxZlJFXmA3SG7iL8malvkUEYo4Q:KX5IMj544IrvfMsbxZTH7qwQ
                                                                                      MD5:230C7B4BB6D64818889E573ADBE97E35
                                                                                      SHA1:97E6D43C3F9446C9A224DAF69F31CA55721BFC59
                                                                                      SHA-256:6CDA69514774093B7219BB079077322F5C783DBAD137F89181E8434D8BD2A6CF
                                                                                      SHA-512:A17246BC44C1FDC971304E0D2E8F721E254880FB725F1AACCA05645FFE82F2AF3791234F02824E357CBDD51D529C882E21B8712735C32420074F3B75813DE27C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Canary) {. {-9223372036854775808 -3696 0 LMT}. {-1509663504 -3600 0 -01}. {-733874400 0 0 WET}. {323827200 3600 1 WEST}. {338950800 0 0 WET}. {354675600 3600 1 WEST}. {370400400 0 0 WET}. {386125200 3600 1 WEST}. {401850000 0 0 WET}. {417574800 3600 1 WEST}. {433299600 0 0 WET}. {449024400 3600 1 WEST}. {465354000 0 0 WET}. {481078800 3600 1 WEST}. {496803600 0 0 WET}. {512528400 3600 1 WEST}. {528253200 0 0 WET}. {543978000 3600 1 WEST}. {559702800 0 0 WET}. {575427600 3600 1 WEST}. {591152400 0 0 WET}. {606877200 3600 1 WEST}. {622602000 0 0 WET}. {638326800 3600 1 WEST}. {654656400 0 0 WET}. {670381200 3600 1 WEST}. {686106000 0 0 WET}. {701830800 3600 1 WEST}. {717555600 0 0 WET}. {733280400 3600 1 WEST}. {749005200 0 0 WET}. {764730000 3600 1 WEST}. {780454800 0 0 WET}. {796179600 3600 1 WEST}. {811904400 0 0 WET
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):237
                                                                                      Entropy (8bit):4.579111187402317
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X52RQ7Sm2OHDVJlvQV2FlRo/FFuykVvQV2FR+nmY:MBp5267SmdHDVwiHoGyLiomY
                                                                                      MD5:51BE50511F1FA17A6AF9D4AE892FAFDA
                                                                                      SHA1:2491743E429AAE5DF70CC3E791DC9875E30F152D
                                                                                      SHA-256:E444B51A4511F83D616E816B770A60088EA94B9286112F47331122F44119541D
                                                                                      SHA-512:A509146E25174D9938AF13B78CF052E45F50A61B834C276607B281EF7B81C6696A793A3769B355C8C804A74F37ADDEBBCDC2A69E3B938EB5A2A9742BE135A4A7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Cape_Verde) {. {-9223372036854775808 -5644 0 LMT}. {-1830376800 -7200 0 -02}. {-862610400 -3600 1 -01}. {-764118000 -7200 0 -02}. {186120000 -3600 0 -01}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.655846706649014
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqLG4E2wFVAIgvMG4EeL2RQqG4EZrB/4RQqG4Ei:SlSWB9IZaM3yCwFVAIgvgL2RQ1rB/4R/
                                                                                      MD5:08C5EE09B8BE16C5E974BA8070D448EA
                                                                                      SHA1:D171C194F6D61A891D3390FF6492AEFB0F67646A
                                                                                      SHA-256:7C6A6BCF5AAEAB1BB57482DF1BBC934D367390782F6D8C5783DBBBE663169A9B
                                                                                      SHA-512:E885F3C30DBE178F88464ED505BA1B838848E6BB15C0D27733932CD0634174D9645C5098686E183CC93CB46DE7EB0DBF2EB64CB77A50FC337E2581E25107C9A6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Atlantic/Faroe)]} {. LoadTimeZoneFile Atlantic/Faroe.}.set TZData(:Atlantic/Faeroe) $TZData(:Atlantic/Faroe).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6551
                                                                                      Entropy (8bit):3.7148806034051316
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:9bd30NSfAewvtj544IrvfMS4pBs6nLUxZlJFXmA3SG7iL8malvkUEYo4Q:8IMj544IrvfMsbxZTH7qwQ
                                                                                      MD5:918E1825106C5C73B203B718918311DC
                                                                                      SHA1:7C31B3521B396FE6BE7162BAECC4CFB4740F622B
                                                                                      SHA-256:B648E691D8F3417B77EFB6D6C2F5052B3C4EAF8B5354E018EE2E9BD26F867B71
                                                                                      SHA-512:5B1B5FE82A13127E3C63C8FB0A8CBD45A7277EF29720B937BB3174E8301830018755416D604F3551622E2E4D365D35E4EE1DF39B587A73E43AE0C68D1996B771
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Faroe) {. {-9223372036854775808 -1624 0 LMT}. {-1955748776 0 0 WET}. {347155200 0 0 WET}. {354675600 3600 1 WEST}. {370400400 0 0 WET}. {386125200 3600 1 WEST}. {401850000 0 0 WET}. {417574800 3600 1 WEST}. {433299600 0 0 WET}. {449024400 3600 1 WEST}. {465354000 0 0 WET}. {481078800 3600 1 WEST}. {496803600 0 0 WET}. {512528400 3600 1 WEST}. {528253200 0 0 WET}. {543978000 3600 1 WEST}. {559702800 0 0 WET}. {575427600 3600 1 WEST}. {591152400 0 0 WET}. {606877200 3600 1 WEST}. {622602000 0 0 WET}. {638326800 3600 1 WEST}. {654656400 0 0 WET}. {670381200 3600 1 WEST}. {686106000 0 0 WET}. {701830800 3600 1 WEST}. {717555600 0 0 WET}. {733280400 3600 1 WEST}. {749005200 0 0 WET}. {764730000 3600 1 WEST}. {780454800 0 0 WET}. {796179600 3600 1 WEST}. {811904400 0 0 WET}. {828234000 3600 1 WEST}. {846378000 0 0 WET}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):175
                                                                                      Entropy (8bit):4.92967249261586
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVyWJooedVAIgoqxWJ0YF2RQqG0EHEcAg/h8QasWJ/n:SlSWB9IZaM3ymSDdVAIgo2Q2RQaK8H
                                                                                      MD5:AD9B5217497DBC1CE598573B85F3C056
                                                                                      SHA1:60984544F5BBD4A5B2B8F43741D66A573A2CF1DC
                                                                                      SHA-256:BE291E952254B6F0C95C2E2497BE12410D7F1E36D0D1035B3A9BC65D0EDCB65F
                                                                                      SHA-512:F5D47008495425C386EBAB426195393168E402726405CF23826571E548A3CEFABBA51D87D637C0724FF2CC4F1276D81EACF14D0F9CFC7CBFCC025EEFA0960278
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Oslo)]} {. LoadTimeZoneFile Europe/Oslo.}.set TZData(:Atlantic/Jan_Mayen) $TZData(:Europe/Oslo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9307
                                                                                      Entropy (8bit):3.715509739111961
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:jZqAUb1iF0Rf0IMj544IrvfMsbxZTH7qwQ:jZqAUb1iF0RffMUM8xZTH7qwQ
                                                                                      MD5:5D2EAAA0D116DD1C7965FCB229678FB4
                                                                                      SHA1:DA59652A8E57DE9FAF02ED6EB9D863CD34642E6C
                                                                                      SHA-256:8AAF754C1F9AABEA185808F21B864B02815D24451DB38BE8629DA4C57141E8F5
                                                                                      SHA-512:E561B09A53CEC764B0B2B2544E774577553F6DFEFB80AEC04698C2B0FBEBBC7F03E11C31627654346752B4F85BB3EF669397162599F3ED6B8B8D286521447361
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Madeira) {. {-9223372036854775808 -4056 0 LMT}. {-2713906344 -4056 0 FMT}. {-1830380400 -3600 0 -01}. {-1689552000 0 1 +00}. {-1677798000 -3600 0 -01}. {-1667433600 0 1 +00}. {-1647734400 -3600 0 -01}. {-1635811200 0 1 +00}. {-1616198400 -3600 0 -01}. {-1604361600 0 1 +00}. {-1584662400 -3600 0 -01}. {-1572739200 0 1 +00}. {-1553040000 -3600 0 -01}. {-1541203200 0 1 +00}. {-1521504000 -3600 0 -01}. {-1442448000 0 1 +00}. {-1426809600 -3600 0 -01}. {-1379289600 0 1 +00}. {-1364774400 -3600 0 -01}. {-1348444800 0 1 +00}. {-1333324800 -3600 0 -01}. {-1316390400 0 1 +00}. {-1301270400 -3600 0 -01}. {-1284336000 0 1 +00}. {-1269820800 -3600 0 -01}. {-1221436800 0 1 +00}. {-1206921600 -3600 0 -01}. {-1191196800 0 1 +00}. {-1175472000 -3600 0 -01}. {-1127692800 0 1 +00}. {-1111968000 -3600 0 -01}. {-1096848000 0 1 +00}. {-10805184
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1962
                                                                                      Entropy (8bit):3.623004596418002
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cQleDGC/2qdDW4saQCwjoDWFGKRJYHL/Tc7PjEWlyvKekkdoUOCOfNOaRqOjo/Kj:5r2cd5fmYEfAfYaRDjys/
                                                                                      MD5:0E3020348755C67F6A48F4C3F0F4E51D
                                                                                      SHA1:FBA44F3DEBC47274A1C9CC4AE5A5F9B363157BF1
                                                                                      SHA-256:83566E49A37703E11CF0884558BE3DD8827BD79409D04C5D053BCA69D666CEC8
                                                                                      SHA-512:97F78A8C98B03705188B6F4D622F3B88D7C85B2FF1578DA24C4CD85C163FB05DBD908413B5F355F001755705F22943B1DA6C2A58A902751787238110D2A81F95
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Reykjavik) {. {-9223372036854775808 -5280 0 LMT}. {-1956609120 -3600 0 -01}. {-1668211200 0 1 -01}. {-1647212400 -3600 0 -01}. {-1636675200 0 1 -01}. {-1613430000 -3600 0 -01}. {-1605139200 0 1 -01}. {-1581894000 -3600 0 -01}. {-1539561600 0 1 -01}. {-1531350000 -3600 0 -01}. {-968025600 0 1 -01}. {-952293600 -3600 0 -01}. {-942008400 0 1 -01}. {-920239200 -3600 0 -01}. {-909957600 0 1 -01}. {-888789600 -3600 0 -01}. {-877903200 0 1 -01}. {-857944800 -3600 0 -01}. {-846453600 0 1 -01}. {-826495200 -3600 0 -01}. {-815004000 0 1 -01}. {-795045600 -3600 0 -01}. {-783554400 0 1 -01}. {-762991200 -3600 0 -01}. {-752104800 0 1 -01}. {-731541600 -3600 0 -01}. {-717631200 0 1 -01}. {-700092000 -3600 0 -01}. {-686181600 0 1 -01}. {-668642400 -3600 0 -01}. {-654732000 0 1 -01}. {-636588000 -3600 0 -01}. {-623282400 0 1 -01}. {-605
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):154
                                                                                      Entropy (8bit):4.967019958156088
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx52RQqGtlN62/EUXGm2OHXT14YvXhFvdQVIK:SlSWB9X52RQrlo2Mbm2OHXqYPTFQV7
                                                                                      MD5:421C0110145FB8288B08133DD1409E75
                                                                                      SHA1:CD2D62E739FF1715268B6DFB2C523ED3C76B7A90
                                                                                      SHA-256:4B78F3E086B2A8B4366362AB5CEF2DF6A28E2B0EA8279C0FE9414E974BBC2E08
                                                                                      SHA-512:3B20413C6E15A846B3CC730EBCD77D8AA170ECC262E160BB996AA79173F30D42588352C38EA1B44539A62D77B2BC8418A3C4B7507997AF4F15FBD647BF567A88
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/South_Georgia) {. {-9223372036854775808 -8768 0 LMT}. {-2524512832 -7200 0 -02}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.831929124818878
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqss1kvFVAIgNGE4Rvt2RQqGt4r+DcsP:SlSWB9IZaM3y7sYFVAIgNT4tt2RQr4rC
                                                                                      MD5:8F4668F0D79577139B59A80D714E45A5
                                                                                      SHA1:BCD79EDCCB687A2E74794B8CFDE99A7FEC294811
                                                                                      SHA-256:C78C4E980A378B781ED6D2EA72ABAEF8FFED186538DEB18B61D94B575734FC6A
                                                                                      SHA-512:08D1472377229BC76A496259344263993791B4DF3F83D94F798779249A5CAE15F6B4341A665387780EA8B1278E9D5FFBCA1BCDE06B3E54750E32078FA482ABD6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Abidjan)]} {. LoadTimeZoneFile Africa/Abidjan.}.set TZData(:Atlantic/St_Helena) $TZData(:Africa/Abidjan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2181
                                                                                      Entropy (8bit):3.570822154620431
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:50wIS1SbSRxS5Sh/ScoOG2S+SZSgSsSs/SYS6SDSF3SLShS7KXS6SkSGSn/S+7SG:PIEg8CCcOFVOfjl/nxw6cmrXlXdgj7E6
                                                                                      MD5:747D86EC0B020967D989E3D6C4DD273F
                                                                                      SHA1:567F9E398FEDF58D68F73EB16CE33F8483B44ECE
                                                                                      SHA-256:F88641114EC11D4129EEFE59CCD587AAD9C1898C3AFEE8A7CB85962312637640
                                                                                      SHA-512:B7A97E1DCC9E52A0565B50C8865A955924AFED08C21BC1DCCF73A3327C98D0A98706C03913A4872BD24DD2167B2170A6134CA177B20305DEF23D72ADDD668FB0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Atlantic/Stanley) {. {-9223372036854775808 -13884 0 LMT}. {-2524507716 -13884 0 SMT}. {-1824235716 -14400 0 -04}. {-1018209600 -10800 1 -04}. {-1003093200 -14400 0 -04}. {-986760000 -10800 1 -04}. {-971643600 -14400 0 -04}. {-954705600 -10800 1 -04}. {-939589200 -14400 0 -04}. {-923256000 -10800 1 -04}. {-908139600 -14400 0 -04}. {-891806400 -10800 1 -04}. {-876690000 -14400 0 -04}. {-860356800 -10800 1 -04}. {420606000 -7200 0 -03}. {433303200 -7200 1 -03}. {452052000 -10800 0 -03}. {464151600 -7200 1 -03}. {483501600 -10800 0 -03}. {495597600 -14400 0 -04}. {495604800 -10800 1 -04}. {514350000 -14400 0 -04}. {527054400 -10800 1 -04}. {545799600 -14400 0 -04}. {558504000 -10800 1 -04}. {577249200 -14400 0 -04}. {589953600 -10800 1 -04}. {608698800 -14400 0 -04}. {621403200 -10800 1 -04}. {640753200 -14400 0 -04}. {652852800 -10800 1 -04}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.813373101386862
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjLHVAIgoXjLSt2QWCCjpMFBx/h4QWCCjLu:SlSWB9IZaM3yI9HVAIgmo2DCeMFB/4D2
                                                                                      MD5:F48AD4B81CD3034F6E5D3CA1B5A8BDD4
                                                                                      SHA1:676FE3F50E3E132C1FD185A1EE1D8C830763204F
                                                                                      SHA-256:553D7DA9A2EDBD933E8920573AE6BCBAA00302817939046CF257CAEACEC19FAD
                                                                                      SHA-512:36A4E2286FBEF2F4ED4B9CD1A71136E227FEF4B693F9F43649B790E859221EE470679A7E3C283770DA5CB0113A1C8C1F99480E7020328FFE3E9C870798B092F5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Sydney)]} {. LoadTimeZoneFile Australia/Sydney.}.set TZData(:Australia/ACT) $TZData(:Australia/Sydney).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8099
                                                                                      Entropy (8bit):3.812665609163787
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:JPtFF+Wc4CNphbQbPzpRtYac1w6N5HxnLmPaod/gWFXht/c+u8dRYaaiqcdtXHVf:JP5+zNMdYacv5HhLmPajSXz5HV5x
                                                                                      MD5:4E73BDB571DBF2625E14E38B84C122B4
                                                                                      SHA1:B9D7B7D2855D102800B53FB304633F5BC961A8D0
                                                                                      SHA-256:9138DF8A3DE8BE4099C9C14917B5C5FD7EB14751ACCD66950E0FDB686555FFD6
                                                                                      SHA-512:CF9AB3E9A7C1A76BCC113828ABAF88FE83AAF5CAD7BD181201E06A0CF43E30BA8817AAA88AB3F0F14F459599D91F63ECE851F095154050263C5AD08B2275B4C7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Adelaide) {. {-9223372036854775808 33260 0 LMT}. {-2364110060 32400 0 ACST}. {-2230189200 34200 0 ACST}. {-1672565340 37800 1 ACDT}. {-1665390600 34200 0 ACST}. {-883639800 37800 1 ACDT}. {-876126600 34200 0 ACST}. {-860398200 37800 1 ACDT}. {-844677000 34200 0 ACST}. {-828343800 37800 1 ACDT}. {-813227400 34200 0 ACST}. {31501800 34200 0 ACST}. {57688200 37800 1 ACDT}. {67969800 34200 0 ACST}. {89137800 37800 1 ACDT}. {100024200 34200 0 ACST}. {120587400 37800 1 ACDT}. {131473800 34200 0 ACST}. {152037000 37800 1 ACDT}. {162923400 34200 0 ACST}. {183486600 37800 1 ACDT}. {194977800 34200 0 ACST}. {215541000 37800 1 ACDT}. {226427400 34200 0 ACST}. {246990600 37800 1 ACDT}. {257877000 34200 0 ACST}. {278440200 37800 1 ACDT}. {289326600 34200 0 ACST}. {309889800 37800 1 ACDT}. {320776200 34200 0 ACST}. {341339400 37800 1 ACDT}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):651
                                                                                      Entropy (8bit):4.265580091557009
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52nmdHLOYPv+tCdd8xdsWz9ag5J4UVdKcWWC:cQne6skVk
                                                                                      MD5:296B4B78CEE05805E5EE53B4D5F7284F
                                                                                      SHA1:DDB5B448E99F278C633B2DBD5A816C4DE28DC726
                                                                                      SHA-256:2580C3EEEC029572A1FF629E393F64E326DEDAA96015641165813718A8891C4D
                                                                                      SHA-512:9DE71000BB8AC48A82D83399BD707B661B50882EEBFE2A7E58A81A2F6C04B1F711DAE3AA09A77A9EE265FB633B8883D2C01867AF96F8BE5137119E4FB447DF8C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Brisbane) {. {-9223372036854775808 36728 0 LMT}. {-2366791928 36000 0 AEST}. {-1672567140 39600 1 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {31500000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {625593600 39600 1 AEDT}. {636480000 36000 0 AEST}. {657043200 39600 1 AEDT}. {667929600 36000 0 AEST}. {688492800 39600 1 AEDT}. {699379200 36000 0 AEST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8162
                                                                                      Entropy (8bit):3.820479465698825
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:EkxtFF+Wc4Yphbhd1zCRtYac1w6N5HxnLmPaod/gWFXht/c+u8dRYaaiqcdtXHVf:Ekx5+X5sYacv5HhLmPajSXz5HV5x
                                                                                      MD5:B4AF947B4737537DF09A039D1E500FB8
                                                                                      SHA1:CCC0DC52D586BFAA7A0E70C80709231B4BB93C54
                                                                                      SHA-256:80BBD6D25D4E4EFA234EAD3CB4EB801DC576D1348B9A3E1B58F729FEB688196D
                                                                                      SHA-512:3B27C36FA3034CB371DD07C992B3A5B1357FC7A892C35910DA139C7DA560DDC0AA1E95966438776F75397E7219A7DA0AD4AD6FB922B5E0BE2828D3534488BFD0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Broken_Hill) {. {-9223372036854775808 33948 0 LMT}. {-2364110748 36000 0 AEST}. {-2314951200 32400 0 ACST}. {-2230189200 34200 0 ACST}. {-1672565340 37800 1 ACDT}. {-1665390600 34200 0 ACST}. {-883639800 37800 1 ACDT}. {-876126600 34200 0 ACST}. {-860398200 37800 1 ACDT}. {-844677000 34200 0 ACST}. {-828343800 37800 1 ACDT}. {-813227400 34200 0 ACST}. {31501800 34200 0 ACST}. {57688200 37800 1 ACDT}. {67969800 34200 0 ACST}. {89137800 37800 1 ACDT}. {100024200 34200 0 ACST}. {120587400 37800 1 ACDT}. {131473800 34200 0 ACST}. {152037000 37800 1 ACDT}. {162923400 34200 0 ACST}. {183486600 37800 1 ACDT}. {194977800 34200 0 ACST}. {215541000 37800 1 ACDT}. {226427400 34200 0 ACST}. {246990600 37800 1 ACDT}. {257877000 34200 0 ACST}. {278440200 37800 1 ACDT}. {289326600 34200 0 ACST}. {309889800 37800 1 ACDT}. {320776200 34200 0 ACS
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):190
                                                                                      Entropy (8bit):4.80238049701662
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjLHVAIgoXjLSt2QWCCjnSV1+QWCCjLu:SlSWB9IZaM3yI9HVAIgmo2DCcq+DCyu
                                                                                      MD5:16F9CFC4C5B9D5F9F9DB9346CECE4393
                                                                                      SHA1:ED1ED7BA73EB287D2C8807C4F8EF3EFA516F5A68
                                                                                      SHA-256:853A159B8503B9E8F42BBCE60496722D0A334FD79F30448BAD651F18BA388055
                                                                                      SHA-512:9572CCB1BC499BADA72B5FE533B56156DB9EB0DEDFD4AE4397AD60F2A8AF5991F7B1B06A1B8D14C73832543AF8C12F5B16A9A80D093BF0C7ED6E38FF8B66E197
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Sydney)]} {. LoadTimeZoneFile Australia/Sydney.}.set TZData(:Australia/Canberra) $TZData(:Australia/Sydney).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8097
                                                                                      Entropy (8bit):3.7668602204696375
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:GJiG+HuKIyymp8tLhbVXd33cZF7bLaE9DTtM/m7eeYWlQOZIeVUF:GJqXytLhbVXdnPQler
                                                                                      MD5:7E0D1435E11C9AE84EF1A863D1D90C61
                                                                                      SHA1:CE76A3D902221F0EF9D8C25EB2D46A63D0D09D0B
                                                                                      SHA-256:3C0B35627729316A391C5A0BEE3A0E353A0BAEAD5E49CE7827E53D0F49FD6723
                                                                                      SHA-512:D262294AC611396633184147B0F6656290BF97A298D6F7EC025E1D88AAC5343363744FD1CB849CDE84F3C1B2CF860CFA7CA43453ADBF68B0903DA1361F0DCD69
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Currie) {. {-9223372036854775808 34528 0 LMT}. {-2345794528 36000 0 AEST}. {-1680508800 39600 1 AEDT}. {-1669892400 39600 0 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {47138400 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226425600 36000 0 AEST}. {246988800 39600 1 AEDT}. {257875200 36000 0 AEST}. {278438400 39600 1 AEDT}. {289324800 36000 0 AEST}. {309888000 39600 1 AEDT}. {320774400 36000 0 AEST}. {341337600 39600 1 AEDT}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):422
                                                                                      Entropy (8bit):4.4678452003570435
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52umdHPPZUj/sVdFFtf/FFAXFFwFFgh:cQuenZq/sVd/tH/AX/w/C
                                                                                      MD5:FC9689FEF4223726207271E2EAAE6548
                                                                                      SHA1:26D0B4FC2AD943FCAC90F179F7DF6C18EE12EBB8
                                                                                      SHA-256:C556C796CCD3C63D9F694535287DC42BB63140C8ED39D31FDA0DA6E94D660A1C
                                                                                      SHA-512:7898C0DE77297FBAA6AAF9D15CB9765DAF63ED4761BA181D0D1A590A6F19A6B7F6E94564A80EB691ED2D89C96D68449BF57816E4093E5011B93D30C3E1624D60
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Darwin) {. {-9223372036854775808 31400 0 LMT}. {-2364108200 32400 0 ACST}. {-2230189200 34200 0 ACST}. {-1672565340 37800 1 ACDT}. {-1665390600 34200 0 ACST}. {-883639800 37800 1 ACDT}. {-876126600 34200 0 ACST}. {-860398200 37800 1 ACDT}. {-844677000 34200 0 ACST}. {-828343800 37800 1 ACDT}. {-813227400 34200 0 ACST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):734
                                                                                      Entropy (8bit):4.049000512576295
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp527JmdHvOYPV2oV2NF2AUV2ikUF2XV2ouwF2aUF2giV2XHVKF2qV2sF2jV2oA:cQ7JemssNLdUpouw5o5X0mszo4Ui/MXu
                                                                                      MD5:F997E4624049132CEC09AC77FBA839E3
                                                                                      SHA1:7BD0097EF75621646CE1969A61596F7FA2E75188
                                                                                      SHA-256:C3E63F8BC7739A23C21DE71425EDDA7927C31D00BC9E23D3A265C93885248991
                                                                                      SHA-512:B50EDBBA11D1B8FC7DF13A9DBDE9314E1694E36F2CB810C0160406406161CC8FD52BDBFD13D10EEABE2859FA7AEBC35EBF9AB826EB92BBF26D92EEDD15633649
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Eucla) {. {-9223372036854775808 30928 0 LMT}. {-2337928528 31500 0 +0945}. {-1672562640 35100 1 +0945}. {-1665387900 31500 0 +0945}. {-883637100 35100 1 +0945}. {-876123900 31500 0 +0945}. {-860395500 35100 1 +0945}. {-844674300 31500 0 +0945}. {-836473500 35100 0 +0945}. {152039700 35100 1 +0945}. {162926100 31500 0 +0945}. {436295700 35100 1 +0945}. {447182100 31500 0 +0945}. {690311700 35100 1 +0945}. {699383700 31500 0 +0945}. {1165079700 35100 1 +0945}. {1174756500 31500 0 +0945}. {1193505300 35100 1 +0945}. {1206810900 31500 0 +0945}. {1224954900 35100 1 +0945}. {1238260500 31500 0 +0945}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8325
                                                                                      Entropy (8bit):3.767204262183229
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:8xKiG+HuKIyymp8tLhbVXd33cZF7bLaE9DTtM/m7eeYWlQOZIeVUF:8xKqXytLhbVXdnPQler
                                                                                      MD5:67AF9A2B827308DD9F7ABEC9441C3250
                                                                                      SHA1:CD87DD4181B41E66EFEA9C7311D5B7191F41EA3A
                                                                                      SHA-256:814BD785B5ACDE9D2F4FC6E592E919BA0FE1C3499AFC1071B7FA02608B6032AB
                                                                                      SHA-512:BC6B8CE215B3B4AC358EB989FB1BB5C6AD61B39B7BBD36AAA924A2352E823C029131E79DA927FEEBDD5CF759FDE527F39089C93B0826995D37052362BEAE09F6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Hobart) {. {-9223372036854775808 35356 0 LMT}. {-2345795356 36000 0 AEST}. {-1680508800 39600 1 AEDT}. {-1669892400 39600 0 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {-94730400 36000 0 AEST}. {-71136000 39600 1 AEDT}. {-55411200 36000 0 AEST}. {-37267200 39600 1 AEDT}. {-25776000 36000 0 AEST}. {-5817600 39600 1 AEDT}. {5673600 36000 0 AEST}. {25632000 39600 1 AEDT}. {37728000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):194
                                                                                      Entropy (8bit):4.865814837459796
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3yIoGEowFVAIgjG/L2DCkx/2DCPGT:MBaIMje0QL2a7
                                                                                      MD5:1221FC8932CA3DCA431304AF660840F0
                                                                                      SHA1:5E023E37D98EA1321B10D36A79B26DF1A017F9D5
                                                                                      SHA-256:EB8FDBCFDE9E2A2AA829E784D402966F61A5BF6F2034E0CB06A24FACB5B87874
                                                                                      SHA-512:EB19FE74DC13456D0F9F1EDC9C444793A4011D3B65ADF6C7E7A405504079EB3A0C27F69DDA662F797FE363948E93833422F5DC3C1891AA7D414B062BE4DD3887
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Lord_Howe)]} {. LoadTimeZoneFile Australia/Lord_Howe.}.set TZData(:Australia/LHI) $TZData(:Australia/Lord_Howe).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):796
                                                                                      Entropy (8bit):4.1890768067004
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52gCmdHVP/+tCdd8xdsWz9ag5J4UVdKcWW3ty/yJATUJrRxC:cQgCeRUVfl7w
                                                                                      MD5:08E88B2169BC76172E40515F9DA2C147
                                                                                      SHA1:5C03B7C9748E63C2B437C97F8ED923A9F3E374E7
                                                                                      SHA-256:9E3558C8514E97274D9F938E9841C5E3355E738BBD55BCB17FA27FF0E0276AEA
                                                                                      SHA-512:39E10639C97DE82428818B9C5D059BA853A17113351BAEE2512806AC3066EDDF0294859519AFBE425E0D1315B1A090F84C08CEFEDCE2A3D3A38EEF782234D8C4
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Lindeman) {. {-9223372036854775808 35756 0 LMT}. {-2366790956 36000 0 AEST}. {-1672567140 39600 1 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {31500000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {625593600 39600 1 AEDT}. {636480000 36000 0 AEST}. {657043200 39600 1 AEDT}. {667929600 36000 0 AEST}. {688492800 39600 1 AEDT}. {699379200 36000 0 AEST}. {709912800 36000 0 AEST}. {719942400 39600 1 AEDT}. {731433600 36000 0 AEST}. {751996800 39600 1 AEDT}. {762883200 36000 0 AEST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7519
                                                                                      Entropy (8bit):3.4688530726187112
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:zVjDVP0Izj1cdhsARcuhb4F3LbSZYt2U/gTpxxM3a6Z/nEgAmQso4QgDD:zv3qrcuhb4FbbCegi
                                                                                      MD5:169FF1BE6B6407E853AAF9F6E9A9A047
                                                                                      SHA1:C573582B8EF897D3AE5CA0FB089BE31F6ED076EB
                                                                                      SHA-256:3C7C5CF7300957F73E9249FC8BF282F7CEE262849DD5D326F476E1AE8A7B8DD5
                                                                                      SHA-512:BD8315022E8B190976FCED98252FCA0C248D857AC5045D741F6902871F0E3C158B248628DF9BA124A38AE878398F8BEA614254400F329D01F60EE50666AEE118
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Lord_Howe) {. {-9223372036854775808 38180 0 LMT}. {-2364114980 36000 0 AEST}. {352216800 37800 0 +1030}. {372785400 41400 1 +1030}. {384273000 37800 0 +1030}. {404839800 41400 1 +1030}. {415722600 37800 0 +1030}. {436289400 41400 1 +1030}. {447172200 37800 0 +1030}. {467739000 41400 1 +1030}. {478621800 37800 0 +1030}. {488984400 37800 0 +1030}. {499188600 39600 1 +1030}. {511282800 37800 0 +1030}. {530033400 39600 1 +1030}. {542732400 37800 0 +1030}. {562087800 39600 1 +1030}. {574786800 37800 0 +1030}. {594142200 39600 1 +1030}. {606236400 37800 0 +1030}. {625591800 39600 1 +1030}. {636476400 37800 0 +1030}. {657041400 39600 1 +1030}. {667926000 37800 0 +1030}. {688491000 39600 1 +1030}. {699375600 37800 0 +1030}. {719940600 39600 1 +1030}. {731430000 37800 0 +1030}. {751995000 39600 1 +1030}. {762879600 37800 0 +1030}. {78344
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8069
                                                                                      Entropy (8bit):3.769669933493392
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:sriG+vi8GyddsYtLhbVXd33cZF7bLaE9DTtM/m7eeYWlQOZIeVUF:sr/2tLhbVXdnPQler
                                                                                      MD5:E38FDAF8D9A9B1D6F2B1A8E10B9886F4
                                                                                      SHA1:6188BD62E94194DB469BE93224A396D08A986D4D
                                                                                      SHA-256:399F727CB39D90520AD6AE78A8963F918A490A813BC4FF2D94A37B0315F52D99
                                                                                      SHA-512:79FDCFF5066636C3218751C8B2B658C6B7A6864264DCC28B47843EAEFDD5564AC5E4B7A66E3D1B0D25DB86D6C6ED55D1599F1FE2C169085A8769E037E0E954BE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Melbourne) {. {-9223372036854775808 34792 0 LMT}. {-2364111592 36000 0 AEST}. {-1672567140 39600 1 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {31500000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226425600 36000 0 AEST}. {246988800 39600 1 AEDT}. {257875200 36000 0 AEST}. {278438400 39600 1 AEDT}. {289324800 36000 0 AEST}. {309888000 39600 1 AEDT}. {320774400 36000 0 AEST}. {341337600 39600 1 AEDT}. {352224000 36000 0 AEST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.8456659038249
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjLHVAIgoXjLSt2QWCCjREeQWCCjLu:SlSWB9IZaM3yI9HVAIgmo2DC5eDCyu
                                                                                      MD5:AE3539C49047BE3F8ABAD1AC670975F1
                                                                                      SHA1:62CD5C3DB618B9FE5630B197AB3A9729B565CA41
                                                                                      SHA-256:938A557C069B8E0BE8F52D721119CBA9A694F62CF8A7A11D68FD230CC231E17C
                                                                                      SHA-512:6F143B50C1EEC1D77F87DD5B0FFCF6625800E247400AA58361748BFEA0626E2CDA9C3FD2A4C269B3218D28FF1FB8533F4F6741F6B2C5E83F9C84A5882C86716B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Sydney)]} {. LoadTimeZoneFile Australia/Sydney.}.set TZData(:Australia/NSW) $TZData(:Australia/Sydney).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):187
                                                                                      Entropy (8bit):4.780732237583773
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjboFVAIgoXjbhvN2QWCCjsrQWCCjb/:SlSWB9IZaM3yIiFVAIgg2DCZrDCy
                                                                                      MD5:70EF2A87B4538500CFADB63B62DDCBC6
                                                                                      SHA1:8D737E6E8D37323D3B41AD419F1CA9B5991E2E99
                                                                                      SHA-256:59B67F2C7C62C5F9A93767898BA1B51315D2AC271075FAFC1A24313BB673FF27
                                                                                      SHA-512:E148FC32894A7138D1547910CBD590891120CE5FB533D1348243539C35CE2994DC9F3E7B6A952BF871882C8D6ECA47E13E08AF59AB52A55F790508F2DB9B0EB6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Darwin)]} {. LoadTimeZoneFile Australia/Darwin.}.set TZData(:Australia/North) $TZData(:Australia/Darwin).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):714
                                                                                      Entropy (8bit):4.257489685002088
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp52wmdHCBdPmzKfkzm2z75izhNhaP0YqozBqmjj4zl5fV59Bhg8lfU:cQweCBpYd7IzrhaMYR8mP4znhf9U
                                                                                      MD5:B354B9525896FDED8769CF5140E76FFF
                                                                                      SHA1:8494E182E3803F2A6369261B4B4EAC184458ECC4
                                                                                      SHA-256:C14CAAD41E99709ABF50BD7F5B1DAFE630CA494602166F527DBDA7C134017FB0
                                                                                      SHA-512:717081F29FBACEE2722399DD627045B710C14CF6021E4F818B1768AF972061232412876872F113C468446D79A366D7FFD2E852563DC44A483761D78C7A16F74A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Perth) {. {-9223372036854775808 27804 0 LMT}. {-2337925404 28800 0 AWST}. {-1672559940 32400 1 AWDT}. {-1665385200 28800 0 AWST}. {-883634400 32400 1 AWDT}. {-876121200 28800 0 AWST}. {-860392800 32400 1 AWDT}. {-844671600 28800 0 AWST}. {-836470800 32400 0 AWST}. {152042400 32400 1 AWDT}. {162928800 28800 0 AWST}. {436298400 32400 1 AWDT}. {447184800 28800 0 AWST}. {690314400 32400 1 AWDT}. {699386400 28800 0 AWST}. {1165082400 32400 1 AWDT}. {1174759200 28800 0 AWST}. {1193508000 32400 1 AWDT}. {1206813600 28800 0 AWST}. {1224957600 32400 1 AWDT}. {1238263200 28800 0 AWST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):198
                                                                                      Entropy (8bit):4.75392731256171
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3yIaWhvFVAIgPWzCxL2DCoRWJvFBx+DC7W6:MBaIMjoTL2rOvFey
                                                                                      MD5:D12C6F15F8BFCA19FA402DAE16FC9529
                                                                                      SHA1:0869E6D11681D74CC3301F4538D98A225BE7C2E1
                                                                                      SHA-256:77EA0243A11D187C995CE8D83370C6682BC39D2C39809892A48251123FF19A1E
                                                                                      SHA-512:A98D1AF1FC3E849CCF9E9CC090D3C65B7104C164762F88B6048EA2802F17D635C2E66BE2661338C1DD604B550A267678245DE867451A1412C4C06411A21BE3A9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Brisbane)]} {. LoadTimeZoneFile Australia/Brisbane.}.set TZData(:Australia/Queensland) $TZData(:Australia/Brisbane).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):193
                                                                                      Entropy (8bit):4.701653352722385
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3yIDRpGvFVAIgSRFL2DCa7QDCuRpv:MBaIMjdp5YFL23QHpv
                                                                                      MD5:23671880AC24D35F231E2FCECC1A5E3A
                                                                                      SHA1:5EE2EFD5ADE268B5114EB02FDA77F4C5F507F3CB
                                                                                      SHA-256:9823032FFEB0BFCE50B6261A848FE0C07267E0846E9F7487AE812CEECB286446
                                                                                      SHA-512:E303C7DE927E7BAA10EE072D5308FEE6C4E9B2D69DDD8EF014ED60574E0855EE803FE19A7CB31587E62CAE894C087D47A91A130213A24FCCD152736D82F55AB1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Adelaide)]} {. LoadTimeZoneFile Australia/Adelaide.}.set TZData(:Australia/South) $TZData(:Australia/Adelaide).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8066
                                                                                      Entropy (8bit):3.763781985138297
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:GZCiG+CiRyddsYtLhbVXd33cZF7bLaE9DTtM/m7eeYWlQOZIeVUF:GZCm2tLhbVXdnPQler
                                                                                      MD5:B3498EEA194DDF38C732269A47050CAA
                                                                                      SHA1:C32B703AA1FA34D890D151300A2B21E0FA8F55D3
                                                                                      SHA-256:0EE9BE0F0D6EC0CE10DEA1BE7A9F494C74B747418E966B85EC1FFB15F6F22A4F
                                                                                      SHA-512:A9419B797B1518AAEEE27A1796D0D024847F7A61D26238F1643EBD6131A6B36007FBABD9E766C3D4ED61B006FD31FC4555CB54B8681E7DBDEC26B38144D64BC9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Australia/Sydney) {. {-9223372036854775808 36292 0 LMT}. {-2364113092 36000 0 AEST}. {-1672567140 39600 1 AEDT}. {-1665392400 36000 0 AEST}. {-883641600 39600 1 AEDT}. {-876128400 36000 0 AEST}. {-860400000 39600 1 AEDT}. {-844678800 36000 0 AEST}. {-828345600 39600 1 AEDT}. {-813229200 36000 0 AEST}. {31500000 36000 0 AEST}. {57686400 39600 1 AEDT}. {67968000 36000 0 AEST}. {89136000 39600 1 AEDT}. {100022400 36000 0 AEST}. {120585600 39600 1 AEDT}. {131472000 36000 0 AEST}. {152035200 39600 1 AEDT}. {162921600 36000 0 AEST}. {183484800 39600 1 AEDT}. {194976000 36000 0 AEST}. {215539200 39600 1 AEDT}. {226425600 36000 0 AEST}. {246988800 39600 1 AEDT}. {257875200 36000 0 AEST}. {278438400 39600 1 AEDT}. {289324800 36000 0 AEST}. {309888000 39600 1 AEDT}. {320774400 36000 0 AEST}. {341337600 39600 1 AEDT}. {352224000 36000 0 AEST}. {3
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):190
                                                                                      Entropy (8bit):4.7264864039237215
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjKD4YFedVAIgoXjKgVAt2QWCCjiiieQWCCjKDvn:SlSWB9IZaM3yI4DVyVAIgxkAt2DC3ne0
                                                                                      MD5:C7C9CDC9EC855D2F0C23673FA0BAFFB6
                                                                                      SHA1:4C79E1C17F418CEE4BE8F638F34201EE843D8E28
                                                                                      SHA-256:014B3D71CE6BD77AD653047CF185EA03C870D78196A236693D7610FED7F30B6F
                                                                                      SHA-512:79AE11CE076BFB87C0AAD35E9AF6E760FC592F1D086EB78E6DF88744F502ED4248853A0EAD72ADA8EA9583161925802EE5E46E3AA8CE8CF873852C26B4FDC05B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Hobart)]} {. LoadTimeZoneFile Australia/Hobart.}.set TZData(:Australia/Tasmania) $TZData(:Australia/Hobart).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):199
                                                                                      Entropy (8bit):4.7697171393457936
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3yIvFfkvFVAIgoFFL2DCzyQDCMFB:MBaIMj9fHaFL2xQzB
                                                                                      MD5:BD2EA272B8DF472E29B7DD0506287E92
                                                                                      SHA1:55BF3A3B6398F9FF1DB3A46998A4EFF44F6F325C
                                                                                      SHA-256:EE35DF8BBCD6A99A5550F67F265044529BD7AF6A83087DD73CA0BE1EE5C8BF51
                                                                                      SHA-512:82B18D2C9BA7113C2714DC79A87101FFB0C36E5520D61ADEAB8A31AD219E51A6402A6C8A8FD7120A330FE8847FF8F083397A1BF5889B73484FBAA6F99497DE48
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Melbourne)]} {. LoadTimeZoneFile Australia/Melbourne.}.set TZData(:Australia/Victoria) $TZData(:Australia/Melbourne).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):183
                                                                                      Entropy (8bit):4.781808870279912
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq/xJjXFedVAIgoXjbOAt2QWCCjH0QWCCj5:SlSWB9IZaM3yIYVAIg9At2DC00DCa
                                                                                      MD5:9E0EF0058DDA86016547F2BFE421DE74
                                                                                      SHA1:5DB6AEAC6B0A42FEAE28BB1A45679BC235F4E5BF
                                                                                      SHA-256:FC952BE48F11362981CDC8859F9C634312E5805F2F1513159F25AEFCE664867C
                                                                                      SHA-512:C60E5A63378F8424CE8D862A575DFE138646D5E88C6A34562A77BEC4B34EA3ED3085424E2130E610197164C7E88805DC6CDE46416EB45DC256F387F632F48CA7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Perth)]} {. LoadTimeZoneFile Australia/Perth.}.set TZData(:Australia/West) $TZData(:Australia/Perth).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):207
                                                                                      Entropy (8bit):4.871861105493913
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3yIcKCFVAIgJKfF2DCkuM0DC9Kl:MBaIMjcKCQJKt2kVSKl
                                                                                      MD5:5C3CED24741704A0A7019FA66AC0C0A1
                                                                                      SHA1:88C7AF3B22ED01ED99784C3FAB4F5112AA4659F3
                                                                                      SHA-256:71A56C71CC30A46950B1B4D4FBB12CB1CBAA24267F994A0F223AE879F1BB6EEC
                                                                                      SHA-512:771A7AC5D03DD7099F565D6E926F7B97E8A7BA3795339D3FD78F7C465005B55388D8CC30A62978042C354254E1BA5467D0832C0D29497E33D6EF1DA217528806
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Australia/Broken_Hill)]} {. LoadTimeZoneFile Australia/Broken_Hill.}.set TZData(:Australia/Yancowinna) $TZData(:Australia/Broken_Hill).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):189
                                                                                      Entropy (8bit):4.84045343046357
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0sMhS4edVAIg20sMhStQ1bNW1h4IAcGEsMhSA:SlSWB9IZaM3y7thtedVAIgpthKQxWh4y
                                                                                      MD5:DF4D752BEEAF40F081C03B4572E9D858
                                                                                      SHA1:A83B5E4C3A9EB0CF43263AFF65DB374353F65595
                                                                                      SHA-256:1B1AD73D3FE403AA1F939F05F613F6A3F39A8BA49543992D836CD6ED14B92F2C
                                                                                      SHA-512:1F96F1D8AACD6D37AC13295B345E761204DAE6AA1DF4894A11E00857CCB7247FA7BEBD22407EA5D13193E2945EB1F4210E32669069F157F1459B26643A67F445
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Rio_Branco)]} {. LoadTimeZoneFile America/Rio_Branco.}.set TZData(:Brazil/Acre) $TZData(:America/Rio_Branco).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.826795532956443
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0wKy4oedVAIg20wK+F1bIAJl0IAcGEwKyvn:SlSWB9IZaM3y7/rDdVAIgp/mxIAE90/8
                                                                                      MD5:86B9E49F604AD5DBC4EC6BA735A513C7
                                                                                      SHA1:BE3AB32339DF9830D4F445CCF883D79DDBA8708E
                                                                                      SHA-256:628A9AE97682B98145588E356948996EAE18528E34A1428A6B2765CCAA7A8A1F
                                                                                      SHA-512:EE312624EC0193C599B2BDBFA57CC4EA7C68890955E0D888149172DF8F2095C553BFBB80BF76C1B8F3232F3A5863A519FF59976BBAEA622C64737890D159AA22
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Noronha)]} {. LoadTimeZoneFile America/Noronha.}.set TZData(:Brazil/DeNoronha) $TZData(:America/Noronha).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):186
                                                                                      Entropy (8bit):4.9019570219911275
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0tQJXvedVAIg20tQJX1bJHIAcGEtQJXv:SlSWB9IZaM3y7tIGdVAIgptExR90tIv
                                                                                      MD5:FBF6B9E8B9C93B1B9E484D88EF208F38
                                                                                      SHA1:44004E19A485B70E003687CB1057B8A2421D1BF0
                                                                                      SHA-256:C89E831C4A0525C3CEFF17072843386369096C08878A4412FB208EF5D3F156D8
                                                                                      SHA-512:4E518FC4CED0C756FF45E0EDE72F6503C4B3AE72E785651DE261D3F261D43F914721EFCEAB272398BC145E41827F35D46DE4E022EAF413D95F64E8B3BD752002
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Sao_Paulo)]} {. LoadTimeZoneFile America/Sao_Paulo.}.set TZData(:Brazil/East) $TZData(:America/Sao_Paulo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):177
                                                                                      Entropy (8bit):4.853909262702622
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0znQZFwFVAIg20znQoCxL1bbAWVIAcGEznQb:SlSWB9IZaM3y7zn+wFVAIgpznzCxLxnJ
                                                                                      MD5:116F0F146B004D476B6B86EC0EE2D54D
                                                                                      SHA1:1F39A84EF3DFF676A844174D9045BE388D3BA8C0
                                                                                      SHA-256:F24B9ED1FAFA98CD7807FFFEF4BACA1BCE1655ABD70EB69D46478732FA0DA573
                                                                                      SHA-512:23BD7EC1B5ADB465A204AAA35024EE917F8D6C3136C4EA973D8B18B586282C4806329CEBE0EDBF9E13D0032063C8082EC0D84A049F1217C856943A4DDC4900D0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Manaus)]} {. LoadTimeZoneFile America/Manaus.}.set TZData(:Brazil/West) $TZData(:America/Manaus).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7471
                                                                                      Entropy (8bit):3.710275786382764
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:ht6CvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQlth:PSTRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:AE72690EF7063F0B9F640096204E2ECE
                                                                                      SHA1:4F815B51DA9BCA97DFF71D191B74D0190890F946
                                                                                      SHA-256:BB2C5E587EE9F9BF85C1D0B6F57197985663D4DFF0FED13233953C1807A1F11C
                                                                                      SHA-512:F7F0911251BC7191754AF0BA2C455E825BF16EA9202A740DC1E07317B1D74CDAF680E161155CC1BD5E862DCEE2A58101F419D8B5E0E24C4BA7134999D9B55C48
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:CET) {. {-9223372036854775808 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 1 CEST}. {-766623600 3600 0 CET}. {228877200 7200 1 CEST}. {243997200 3600 0 CET}. {260326800 7200 1 CEST}. {276051600 3600 0 CET}. {291776400 7200 1 CEST}. {307501200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {401850000 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8227
                                                                                      Entropy (8bit):3.723597525146651
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:KxrIOdXkqbfkeTzZSJw5/9/yuvQ+hcrD57X0N41+IestuNEbYkzbXwDTIRqfhXbo:KxrIOdXkqbfNTzZSJw5/9/yuvQ6crD5r
                                                                                      MD5:B5AC3FA83585957217CA04384171F0FF
                                                                                      SHA1:827FF1FBDADDDE3754453E680B4E719A50499AE6
                                                                                      SHA-256:17CBE2F211973F827E0D5F9F2B4365951164BC06DA065F6F38F45CB064B29457
                                                                                      SHA-512:A56485813C47758F988A250FFA97E2DBD7A69DDD16034E9EF2834AF895E8A374EEB4DA3F36E6AD80285AC10F84543ECF5840670805082E238F822F85D635651F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:CST6CDT) {. {-9223372036854775808 -21600 0 CST}. {-1633276800 -18000 1 CDT}. {-1615136400 -21600 0 CST}. {-1601827200 -18000 1 CDT}. {-1583686800 -21600 0 CST}. {-880214400 -18000 1 CWT}. {-769395600 -18000 1 CPT}. {-765392400 -21600 0 CST}. {-84384000 -18000 1 CDT}. {-68662800 -21600 0 CST}. {-52934400 -18000 1 CDT}. {-37213200 -21600 0 CST}. {-21484800 -18000 1 CDT}. {-5763600 -21600 0 CST}. {9964800 -18000 1 CDT}. {25686000 -21600 0 CST}. {41414400 -18000 1 CDT}. {57740400 -21600 0 CST}. {73468800 -18000 1 CDT}. {89190000 -21600 0 CST}. {104918400 -18000 1 CDT}. {120639600 -21600 0 CST}. {126691200 -18000 1 CDT}. {152089200 -21600 0 CST}. {162374400 -18000 1 CDT}. {183538800 -21600 0 CST}. {199267200 -18000 1 CDT}. {215593200 -21600 0 CST}. {230716800 -18000 1 CDT}. {247042800 -21600 0 CST}. {262771200 -18000 1 CDT}. {278492400 -216
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.754307292225081
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx02NEO4FVAIg202NEtYF0nalGe2IAcGE2NEOv:SlSWB9IZaM3y7UEO4FVAIgpUEqF0af2b
                                                                                      MD5:B0E220B9CD16038AAF3EA21D60064B62
                                                                                      SHA1:333410CB7D4F96EF836CDC8097A1DCE34A2B961A
                                                                                      SHA-256:6F71D7ED827C9EF6E758A44D2A998673E1225EB8005AD557A1713F5894833F92
                                                                                      SHA-512:F879F60E36C739280E8FC255D2792BB24BCA90A265F8F90B5FB85630D5A58CE4FDBD24EA5594924375C3CD31DBC6D49C06CBFA43C52D0B9A1E9D799914A164F7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Halifax)]} {. LoadTimeZoneFile America/Halifax.}.set TZData(:Canada/Atlantic) $TZData(:America/Halifax).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):186
                                                                                      Entropy (8bit):4.814426408072182
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0po4FVAIg20peRL0nPQox/h4IAcGEpov:SlSWB9IZaM3y7phFVAIgppOL0d490py
                                                                                      MD5:8374E381BC8235B11B7C5CA215FA112C
                                                                                      SHA1:181298556253D634B09D72BD925C4DBB92055A06
                                                                                      SHA-256:1B87273B264A3243D2025B1CFC05B0797CBC4AA95D3319EEE2BEF8A09FDA8CAD
                                                                                      SHA-512:12800E49B8094843F66454E270B4BE154B053E5FB453C83269AF7C27B965071C88B02AF7BB404E7F5A07277DB45E58D1C5240B377FC06172087BB29749C7543B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Winnipeg)]} {. LoadTimeZoneFile America/Winnipeg.}.set TZData(:Canada/Central) $TZData(:America/Winnipeg).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):190
                                                                                      Entropy (8bit):4.860347334610986
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0sAzE5YyVAIg20sAzEvYvW60nbP2/8S64IAcGEsAz1:SlSWB9IZaM3y7hzipVAIgphzGCW60L5X
                                                                                      MD5:F5CB42BC029315088FAD03C9235FFB51
                                                                                      SHA1:7773ECE0B85D66E4FA207A26EE4395F38BAC4068
                                                                                      SHA-256:AF04A4558E31C9864B92FE3403011F7A2FBD837E1314A7BB5AF552D5AED06457
                                                                                      SHA-512:0533B9D98834866FAA3C6E67A6F61A8A22C2BFDBA8C5336388C0894FBA550611C9112515F17E20E7B3508EC2318D58EA7CA814EC10C3451954C3CC169EDA0F8C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Regina)]} {. LoadTimeZoneFile America/Regina.}.set TZData(:Canada/East-Saskatchewan) $TZData(:America/Regina).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):183
                                                                                      Entropy (8bit):4.7067203041014185
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qMKLRXIVAIg20qMKLRI60nbHboxp4IAcGEqMKLRXv:SlSWB9IZaM3y7RQ+VAIgpRQ+60Dboxp2
                                                                                      MD5:22453AC70F84F34868B442E0A7BDC20A
                                                                                      SHA1:730049FF6953E186C197601B27AB850305961FD0
                                                                                      SHA-256:545B992E943A32210F768CB86DEF3203BE956EE03A3B1BC0D55A5CD18A4F064D
                                                                                      SHA-512:91FE33FAD3954019F632A771BCBD9FF3FDCCDA1F51DD25E0E5808A724F2D9B905E5E2DEE32D415BEA9A9ADB74186D83548584414BB130DF1A166D49373AC7BEF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Toronto)]} {. LoadTimeZoneFile America/Toronto.}.set TZData(:Canada/Eastern) $TZData(:America/Toronto).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):187
                                                                                      Entropy (8bit):4.768148288986999
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx07nKL5zFVAIg207nKLKN0nNYLo/4IAcGE7nKLun:SlSWB9IZaM3y77GzFVAIgp7DN0W8/49s
                                                                                      MD5:5E0D3D1A7E9F800210BB3E02DFF2ECD3
                                                                                      SHA1:F2471795A9314A292DEAA3F3B94145D3DE5A2792
                                                                                      SHA-256:A8B3A4D53AA1CC73312E80951A9E9CEA162F4F51DA29B897FEB58B2DF3431821
                                                                                      SHA-512:F80C7CDFE20E5FAD9E4BA457446F067ACE0C3F4659761E3B4A2422D3456CDE92C20589954DE5E0DC64619E3B6AB3A55AE0E0E783F8EFB24D74A5F6DFBF5ABB16
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Edmonton)]} {. LoadTimeZoneFile America/Edmonton.}.set TZData(:Canada/Mountain) $TZData(:America/Edmonton).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):191
                                                                                      Entropy (8bit):4.953647576523321
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0tVZMYFwFVAIg20tVZoYvxL0nJBJi6FBx/2IAcGEt3:SlSWB9IZaM3y7tgYmFVAIgptMqL0xdB7
                                                                                      MD5:3A4E193C8624AE282739867B22B7270A
                                                                                      SHA1:AC93EEDA7E8AB7E40834FFBA83BAE5D803CB7162
                                                                                      SHA-256:70EF849809F72741FA4F37C04C102A8C6733639E905B4E7F554F1D94737BF26B
                                                                                      SHA-512:BE2AACEE2A6F74520F4F1C0CCBBB750ED6C7375D4368023BAB419184F8F717D52981106C03F487B24A943907E60784136C0E5F8C1D5B3D1C67C20E23A4F412B3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/St_Johns)]} {. LoadTimeZoneFile America/St_Johns.}.set TZData(:Canada/Newfoundland) $TZData(:America/St_Johns).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):189
                                                                                      Entropy (8bit):4.839589386398345
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0oELSTAWFwVAIg20oELSTAQO0L0nie2IAcGEoELSTH:SlSWB9IZaM3y7ZLgXwVAIgpZLgJJL0Nu
                                                                                      MD5:6AA0FCE594E991D6772C04E137C7BE00
                                                                                      SHA1:6C53EE6FEBEC2BD5271DD80D40146247E779CB7B
                                                                                      SHA-256:D2858621DA914C3F853E399F0819BA05BDE68848E78F59695B84B2B83C1FDD2A
                                                                                      SHA-512:7B354BB9370BB61EB0E801A1477815865FDE51E6EA43BF166A6B1EED127488CC25106DEE1C6C5DC1EF3E13E9819451E10AFBC0E189D3D3CDE8AFFA4334C77CA3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Vancouver)]} {. LoadTimeZoneFile America/Vancouver.}.set TZData(:Canada/Pacific) $TZData(:America/Vancouver).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.83938055689947
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0sAzE5YyVAIg20sAzEvYvW60nogS64IAcGEsAzEun:SlSWB9IZaM3y7hzipVAIgphzGCW60Hd9
                                                                                      MD5:927FD3986F83A60C217A3006F65A3B0A
                                                                                      SHA1:022D118024BFC5AE0922A1385288C3E4B41903DB
                                                                                      SHA-256:BB457E954DB625A8606DD0F372DA9BFFAA01F774B4B82A2B1CEE2E969C15ABC3
                                                                                      SHA-512:3EA932FA5416A9C817977F9D31C8A15C937A453B4D6A6409A7966E76D66A685C91F1117C82BEBEBA2AF5516556DA2BDEC898AD718C78FB8B690F31692174DA6C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Regina)]} {. LoadTimeZoneFile America/Regina.}.set TZData(:Canada/Saskatchewan) $TZData(:America/Regina).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):190
                                                                                      Entropy (8bit):4.841592909599599
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0peR2pVkvFVAIg20peR2zxL0nTOK8x/h4IAcGEpeRu:SlSWB9IZaM3y7peR2fkvFVAIgppeR2FF
                                                                                      MD5:9F2A7F0D8492F67F764F647638533C3F
                                                                                      SHA1:3785DACD1645E0630649E411DC834E8A4FB7F40B
                                                                                      SHA-256:F2A81B7E95D49CEC3C8952463B727129B4DC43D58ADC64BB7CAB642D3D191039
                                                                                      SHA-512:0133870BB96851ECD486D55FD10EB4BCB1678772C1BFFADE85FC5644AC8445CDB4C6284BEFFED197E9386C9C6EF74F5F718F2CB43C4C7B8E65FE413C8EC51CD0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Whitehorse)]} {. LoadTimeZoneFile America/Whitehorse.}.set TZData(:Canada/Yukon) $TZData(:America/Whitehorse).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):189
                                                                                      Entropy (8bit):4.762021566751952
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0tfEJ5YyVAIg20tfEJvYvWAt0dKLRMyREGH/h4IAcB:SlSWB9IZaM3y7tfEJHVAIgptfEJAvN0+
                                                                                      MD5:B2BDB6C027FF34D624EA8B992E5F41AB
                                                                                      SHA1:425AB0D603C3F5810047A7DC8FD28FDF306CC2DB
                                                                                      SHA-256:F2E3C1E88C5D165E1D38B0D2766D64AA4D2E6996DF1BE58DADC9C4FC4F503A2E
                                                                                      SHA-512:6E5A8DC6F5D5F0218C37EE719441EBDC7EDED3708F8705A98AEF7E256C8DC5D82F4BF82C529282E01D8E6E669C4F843B143730AD9D8BBF43BCC98ECB65B52C9B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Santiago)]} {. LoadTimeZoneFile America/Santiago.}.set TZData(:Chile/Continental) $TZData(:America/Santiago).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.758503564906338
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG7ZAJpVAIgObT7ZA6xL0bxOdBx/nUDH7ZAen:SlSWB9IZaM3ycJA3VAIgObJA6xL04dB4
                                                                                      MD5:E9DF5E3D9E5E242A1B9C73D8F35C9911
                                                                                      SHA1:9905EF3C1847CFF8156EC745779FCF0D920199B7
                                                                                      SHA-256:AA305BEC168C0A5C8494B81114D69C61A0D3CF748995AF5CCC3E2591AC78C90C
                                                                                      SHA-512:7707AC84D5C305F40A1713F1CBBED8A223553A5F989281CCDB278F0BD0D408E6FC9396D9FA0CCC82168248A30362D2D4B27EDEF36D9A3D70E286A5B668686FDE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Easter)]} {. LoadTimeZoneFile Pacific/Easter.}.set TZData(:Chile/EasterIsland) $TZData(:Pacific/Easter).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):170
                                                                                      Entropy (8bit):4.8073098952422395
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx02TEMVFwVAIg202TEKN0lIAcGE2TEMv:SlSWB9IZaM3y76EHVAIgp6EKN0l906Eu
                                                                                      MD5:BA8EE8511A2013E791A3C50369488588
                                                                                      SHA1:03BF30F56FB604480A9F5ECD8FB13E3CF82F4524
                                                                                      SHA-256:2F9DFE275B62EFBCD5F72D6A13C6BB9AFD2F67FDDD8843013D128D55373CD677
                                                                                      SHA-512:29C9E9F4B9679AFD688A90A605CFC1D7B86514C4966E2196A4A5D48D4F1CF16775DFBDF1C9793C3BDAA13B6986765531B2E11398EFE5662EEDA7B37110697832
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Havana)]} {. LoadTimeZoneFile America/Havana.}.set TZData(:Cuba) $TZData(:America/Havana).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7189
                                                                                      Entropy (8bit):3.6040923024580884
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:WB8kMKVCy+Hk+PVqVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lf:AroXPzh2kNU4tB715pyzHy1gA
                                                                                      MD5:9AE4C7EC014649393D354B02DF00F8B9
                                                                                      SHA1:D82195DEF49CFFEAB3791EA70E6D1BB8BC113155
                                                                                      SHA-256:4CB6582052BE7784DD08CE7FD97ACC56234F07BCF80B69E57111A8F88454908E
                                                                                      SHA-512:6F0C138AF98A4D4A1028487C29267088BD4C0EC9E7C1DB9818FA31A61C9584B67B3F5909C6E6FDB0F7183629E892A77BA97654D39FCE7DDEF6908F8146B7BE72
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:EET) {. {-9223372036854775808 7200 0 EET}. {228877200 10800 1 EEST}. {243997200 7200 0 EET}. {260326800 10800 1 EEST}. {276051600 7200 0 EET}. {291776400 10800 1 EEST}. {307501200 7200 0 EET}. {323830800 10800 1 EEST}. {338950800 7200 0 EET}. {354675600 10800 1 EEST}. {370400400 7200 0 EET}. {386125200 10800 1 EEST}. {401850000 7200 0 EET}. {417574800 10800 1 EEST}. {433299600 7200 0 EET}. {449024400 10800 1 EEST}. {465354000 7200 0 EET}. {481078800 10800 1 EEST}. {496803600 7200 0 EET}. {512528400 10800 1 EEST}. {528253200 7200 0 EET}. {543978000 10800 1 EEST}. {559702800 7200 0 EET}. {575427600 10800 1 EEST}. {591152400 7200 0 EET}. {606877200 10800 1 EEST}. {622602000 7200 0 EET}. {638326800 10800 1 EEST}. {654656400 7200 0 EET}. {670381200 10800 1 EEST}. {686106000 7200 0 EET}. {701830800 10800 1 EEST}. {717555600 7200 0 EET}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):106
                                                                                      Entropy (8bit):4.879680803636454
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yLWkXGm2OHLVvain:SlSWB9X5y2m2OHLViin
                                                                                      MD5:33221E0807873CC5E16A55BF4450B6D4
                                                                                      SHA1:A01FD9D1B8E554EE7A25473C2FBECA3B08B7FD02
                                                                                      SHA-256:5AA7D9865554BCE546F1846935C5F68C9CA806B29B6A45765BA55E09B14363E4
                                                                                      SHA-512:54A33B239BBFCFC645409FBC8D9DDBFCAE56067FA0427D0BE5F49CB32EB8EEC8E43FC22CE1C083FDC17DD8591BE9DB28A2D5006AFA473F10FB17EF2CE7AED305
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:EST) {. {-9223372036854775808 -18000 0 EST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8227
                                                                                      Entropy (8bit):3.723178863172678
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:W4UwdaC3Xm8sHRwvOTFhP5S+ijFnRaJeaX1eyDt:Cwdrn+qvOTFhPI1jFIL
                                                                                      MD5:1A7BDED5B0BADD36F76E1971562B3D3B
                                                                                      SHA1:CF5BB82484C4522B178E25D14A42B3DBE02D987D
                                                                                      SHA-256:AFD2F12E50370610EA61BA9DD3838129785DFDEE1EBCC4E37621B54A4CF2AE3F
                                                                                      SHA-512:4803A906E2C18A2792BF812B8D26C936C71D8A9DD9E87F7DA06630978FCB5DE1094CD20458D37973AA9967D51B97F94A5785B7B15F807E526C13D018688F16D9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:EST5EDT) {. {-9223372036854775808 -18000 0 EST}. {-1633280400 -14400 1 EDT}. {-1615140000 -18000 0 EST}. {-1601830800 -14400 1 EDT}. {-1583690400 -18000 0 EST}. {-880218000 -14400 1 EWT}. {-769395600 -14400 1 EPT}. {-765396000 -18000 0 EST}. {-84387600 -14400 1 EDT}. {-68666400 -18000 0 EST}. {-52938000 -14400 1 EDT}. {-37216800 -18000 0 EST}. {-21488400 -14400 1 EDT}. {-5767200 -18000 0 EST}. {9961200 -14400 1 EDT}. {25682400 -18000 0 EST}. {41410800 -14400 1 EDT}. {57736800 -18000 0 EST}. {73465200 -14400 1 EDT}. {89186400 -18000 0 EST}. {104914800 -14400 1 EDT}. {120636000 -18000 0 EST}. {126687600 -14400 1 EDT}. {152085600 -18000 0 EST}. {162370800 -14400 1 EDT}. {183535200 -18000 0 EST}. {199263600 -14400 1 EDT}. {215589600 -18000 0 EST}. {230713200 -14400 1 EDT}. {247039200 -18000 0 EST}. {262767600 -14400 1 EDT}. {278488800 -180
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):165
                                                                                      Entropy (8bit):4.812476042768195
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsPHVyVAIgNGE7JW6yCh0DcPHv:SlSWB9IZaM3y7AVAIgNTFW6yg0DY
                                                                                      MD5:3708D7ED7044DE74B8BE5EBD7314371B
                                                                                      SHA1:5DDC75C6204D1A2A59C8441A8CAF609404472895
                                                                                      SHA-256:07F4B09FA0A1D0BA63E17AD682CAD9535592B372815AB8FD4884ACD92EC3D434
                                                                                      SHA-512:A8761601CD9B601E0CE8AC35B6C7F02A56B07DC8DE31DEB99F60CB3013DEAD900C74702031B5F5F9C2738BA48A8420603D46C3AE0E0C87D40B9D9D44CE0EAE81
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Cairo)]} {. LoadTimeZoneFile Africa/Cairo.}.set TZData(:Egypt) $TZData(:Africa/Cairo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):167
                                                                                      Entropy (8bit):4.85316662399069
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV5QH+owFVAIgoq6QH7W6yMQs/h8QanQHpn:SlSWB9IZaM3ymnQeowFVAIgonQbNyM/R
                                                                                      MD5:AA0DEB998177EB5208C4D207D46ECCE3
                                                                                      SHA1:DD8C7CE874EE12DD77F467B74A9C8FC74C7045FF
                                                                                      SHA-256:16A42F07DE5233599866ECC1CBB1FC4CD4483AC64E286387A0EED1AFF919717D
                                                                                      SHA-512:D93A66A62304D1732412CAAAB2F86CE5BCD07D07C1315714D81754827D5EFD30E36D06C0DC3CF4A8C86B750D7D6A144D609D05E241FADC7FF78D3DD2044E4CBB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Dublin)]} {. LoadTimeZoneFile Europe/Dublin.}.set TZData(:Eire) $TZData(:Europe/Dublin).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):105
                                                                                      Entropy (8bit):4.883978227144926
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDMWkXGm2OHvDd:SlSWB9X5yRQCm2OHB
                                                                                      MD5:94CDB0947C94E40D59CB9E56DB1FA435
                                                                                      SHA1:B73907DAC08787D3859093E8F09828229EBAA6FD
                                                                                      SHA-256:17AF31BD69C0048A0787BA588AD8641F1DC000A8C7AEC66386B0D9F80417ABBF
                                                                                      SHA-512:5F47A2864F9036F3FD61FC65ED4969330DD2A1AC237CB2BD8E972DDFED75120D8D377D5C84060015DCFC163D03F384DC56DC8C6F29E65528C04F1FDA8BBC688E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT) {. {-9223372036854775808 0 0 GMT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):154
                                                                                      Entropy (8bit):4.862090278972909
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtyRDOm7/8RDMvn:SlSWB9IZaM3yF4FVAIgJtyRSw8RQvn
                                                                                      MD5:4AC2027A430A7343B74393C7FE1D6285
                                                                                      SHA1:C675A91954EC82EB67E1B7FA4B0C0ED11AAF83DA
                                                                                      SHA-256:01EEF5F81290DBA38366D8BEADAD156AAC40D049DBFA5B4D0E6A6A8641D798D1
                                                                                      SHA-512:61943A348C4D133B0730EAA264A15EF37E0BBE2F767D87574801EAAA9A457DA48D854308B6ABADA21D33F4D498EB748BCB66964EB14BB8DC1367F77A803BA520
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Etc/GMT+0) $TZData(:Etc/GMT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):111
                                                                                      Entropy (8bit):4.936955816757987
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOvedSXGm2OH1VOY:SlSWB9X5yRSvwJm2OH1VOY
                                                                                      MD5:B8D9D5AF8CE887722F92207393F93481
                                                                                      SHA1:3F33F97F96AE9C30A616B8A84888B032A3E1A59A
                                                                                      SHA-256:049ABD0DCEC9C4128FF6F5BBB1F1D64F53AB7E4A1BD07D0650B0B67D1F581C64
                                                                                      SHA-512:7A10D28DA75FCBF5AF43FEECB91801E97CB161A6909E9463A2F1218323EE3B4ECA10E11438D20E876B6EF912E21D26264FFBD04C75D702D2386A4E959EB5FFAC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+1) {. {-9223372036854775808 -3600 0 -01}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):113
                                                                                      Entropy (8bit):4.92045957745591
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOgFkXGm2OH1VYU8Cn:SlSWB9X5yRS0m2OH1VYQn
                                                                                      MD5:33022DF11BC5459AA1DD968CEF24EA03
                                                                                      SHA1:45DE6AD3B142C1768B410C047DFD45444E307AB8
                                                                                      SHA-256:15F72B4F2C04EDDC778AAD999B5A329F55F0D10AC141862488D2DCE520541A85
                                                                                      SHA-512:0C13040965135D199A29CFE8E1598AA8E840B141B85CCF1A45611B367AF046107FDA8478B1779E2AC665534DC4E84630267B42F902DB3A2CB78DD6D20939010E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+10) {. {-9223372036854775808 -36000 0 -10}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):113
                                                                                      Entropy (8bit):4.959312316620187
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOeLXGm2OHaBBKn:SlSWB9X5yRShm2OHa7Kn
                                                                                      MD5:5FC01E15A719B73A5AA5B0A6E7F16B0C
                                                                                      SHA1:E1AAEF7C52DF944A9AEDCC74E6A07FABE09BAFCE
                                                                                      SHA-256:69A82F9EB9E120FABFA88C846BC836B85A08FFF4B304914256E6C3A72CB371D0
                                                                                      SHA-512:86659001C159730C012C385D505CD822F5CE6E59C0BD7899F90070372A56D348F0292F74C34A4E960E721D113DB5F65751A513D7C1A3CFBF09CBA22118323DED
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+11) {. {-9223372036854775808 -39600 0 -11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):113
                                                                                      Entropy (8bit):4.934932781202811
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOK/kXGm2OH3FNyU7n:SlSWB9X5yRSKTm2OH3Xyan
                                                                                      MD5:BEE0C510C41F541B4E919183459488B2
                                                                                      SHA1:DA028394973155C52EDDDB4EB4CCACA7F3A74188
                                                                                      SHA-256:3B3DA9CF6FEB6E90772E9EC391D857D060A2F52A34191C3A0472794FEC421F5F
                                                                                      SHA-512:9EBE1FAD2B47DDA627F52F97094556F3A8C0D03BF2DD4C12CC8611BD2D59FE3A2C1016FFBDF0B95F2C5C56D81C8B2020EBF1D2AB4AAAFE33AB5469AFE1C596A1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+12) {. {-9223372036854775808 -43200 0 -12}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):111
                                                                                      Entropy (8bit):4.876100974396153
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOcFwFFkXGm2OHnFQVIK:SlSWB9X5yRS0wTm2OHnFQV7
                                                                                      MD5:316ED84A4318F8641592A0959395EFA3
                                                                                      SHA1:970C97E6F433524BE88031098DD4F5F479FB4AA6
                                                                                      SHA-256:8323CA90E2902CAAD2EBCFFBF681FC3661424AE5B179140581AA768E36639C93
                                                                                      SHA-512:6DD62C72E24A24F8FCD8EC085942920A04A55DD03D54C712ADA2BE0EDD6166F34A1229E045C50384808735C40CF72B98458E0329B9762B4B3E95E7ACABB0017E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+2) {. {-9223372036854775808 -7200 0 -02}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.904010922708719
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOCcXGm2OHBFVGHC:SlSWB9X5yRSCTm2OHBFAHC
                                                                                      MD5:899F1AAB147D5A13D7E22CBE374F3F8D
                                                                                      SHA1:C132B5E0859EB6C95C64D50408D4A310893D1E8F
                                                                                      SHA-256:3C2EF9B7218D133E7611527CE1CD5F03FF6FED5DE245F082FF21F4571A7D9EA4
                                                                                      SHA-512:63C8F98BAE437BB9717A3D13C70424FBB43CBA392A1750DE8EAB31C825F190C5DE1987B391591361F80CE084896B838BE78CBE56C1E1C4DC0A1A6D280742FD91
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+3) {. {-9223372036854775808 -10800 0 -03}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.92751033740291
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOqLXGm2OHBvG9:SlSWB9X5yRStm2OHBO9
                                                                                      MD5:9D050C35FCDFD703C387CF2065E6250B
                                                                                      SHA1:EEE8A277CB49D03085A5C6FCEA94961790D23339
                                                                                      SHA-256:B43B685B6B168FD964590BC6C4264511155DB76EBCB7A5BCB20C35C0AD9B8CC4
                                                                                      SHA-512:D56449C34A7F63DCCE79F4A6C4731454BB909C6DA49593FFE6B59DD3DE755720931BFD245A799B7FB1397FC0AE0AF89E88AD4DAA91AB815740328B27D301DCDE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+4) {. {-9223372036854775808 -14400 0 -04}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.911642645675445
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOEkXGm2OHLVvyV9C:SlSWB9X5yRSQm2OHLVKV9C
                                                                                      MD5:81856E9473F48AB0F53B09CB6BEF61B1
                                                                                      SHA1:52A906EE5B706091E407CA8A0D036A46727790EA
                                                                                      SHA-256:B0224DBA144B1FE360E2922B1E558E79F6960A173045DE2A1EDACDC3F24A3E36
                                                                                      SHA-512:7C9679A2C299741E98FF1E759313D1CDC050B73B7E4FB097FF3186B4C35271C203D54E12D758675639A3D3F3F1EB43D768834B9CE7D22376BEA71FB0ACF164A7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+5) {. {-9223372036854775808 -18000 0 -05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.930765051479699
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOAkEXGm2OHvTmUK:SlSWB9X5yRSbLm2OHvin
                                                                                      MD5:757E578CE6FCD34966D9FF90D9F9A7BF
                                                                                      SHA1:091E3FC890BF7A4C61CF6558F7984FD41F61803B
                                                                                      SHA-256:28F4E6F7FDE80AE412D364D33A1714826F9F53FF980D2926D13229B691978979
                                                                                      SHA-512:442FEBA01108124692A0F76ACA4868D5B7754C3527B9301AC0271DD5A379AF3675CE40B6C017310856D4CE700E3171B5EEA5EF89D5F8432EC3D6D27F48F2EEE8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+6) {. {-9223372036854775808 -21600 0 -06}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.884164328721898
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDONedFkXGm2OHrXVYVe:SlSWB9X5yRSNwJm2OHriVe
                                                                                      MD5:723CE2E217F73927FE030E4E004C68B5
                                                                                      SHA1:40E46C8F3631298C3FFBF0DDC72E48E13A42A3F4
                                                                                      SHA-256:2D2B6A351501CB1023F45CE9B16B759D8971E45C2B8E1348A6935707925F0280
                                                                                      SHA-512:25E1C37047CD2411B6F986F30EC54B53A3D3841FD275D05732A0DF6C0718981F2343CEE77E241F347030244B22EC4A23FDEE077EB4D18BC1788F4E5AF4FDB804
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+7) {. {-9223372036854775808 -25200 0 -07}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.869188292977557
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOOFwFSXGm2OHmFvGRvn:SlSWB9X5yRSqwTm2OHaOJ
                                                                                      MD5:A94A70486CE0942B538D855647EDFE78
                                                                                      SHA1:1A20872C6D577DB332F0A536695CE677BC28F294
                                                                                      SHA-256:9CF2C86CC6173F19E0DA78CCA46C302469AB5C01752DCEA6A20DC151E2D980CC
                                                                                      SHA-512:3B6456D217A08A6DBAC0DB296384F4DED803F080FD5C0FD1527535D85397351C67B3D2BEDF8C4E2FEFD5C0B9297A8DA938CF855CDAA2BB902498B15E75A0F776
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+8) {. {-9223372036854775808 -28800 0 -08}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.912907908622555
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDOwcXGm2OHNmuvn:SlSWB9X5yRSwTm2OHNmuv
                                                                                      MD5:821C0743B99BBD9B672D1B1606B2DADD
                                                                                      SHA1:152C09F6E8079A4036BA8316BE3E739D2ECE674B
                                                                                      SHA-256:532D16E2CDBE8E547F54DC22B521153D2215E8B6653336A36F045E0D338B0D1B
                                                                                      SHA-512:CCFC5BC6246B4C9EF77081E79F0A0B1DACC79449388AD08F38912E857E77E12824835C447F769A2C9C707C7E6353010A9907CDF3468A94263CF2B21FC1BF4710
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT+9) {. {-9223372036854775808 -32400 0 -09}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):154
                                                                                      Entropy (8bit):4.849103265985896
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtyRDIyHp8RDMvn:SlSWB9IZaM3yF4FVAIgJtyRUyJ8RQvn
                                                                                      MD5:FA608B6E2F9D0E64D2DF81B277D40E35
                                                                                      SHA1:55A7735ACCF6A759D2069388B2943323E23EE56D
                                                                                      SHA-256:48A929080C1E7C901246DC83A7A7F87396EAF9D982659460BF33A85B4C3FAE64
                                                                                      SHA-512:35A8899B7084E85165886B07B6DD553745558EAF4297F702829A08BF71E5AA18790F0D02229093FA42515C97A1DDA7292F4D019DDB1251370D9896E94738D32A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Etc/GMT-0) $TZData(:Etc/GMT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):110
                                                                                      Entropy (8bit):4.936514686189307
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDI4cXGm2OHMKUbvn:SlSWB9X5yRU4Tm2OHtUbv
                                                                                      MD5:CCC4BDA6EDA4933FB64F329E83EB6118
                                                                                      SHA1:7C1B47D376966451540B4D095D16973763A73A73
                                                                                      SHA-256:A82AA68616ADEB647456EA641587D76981888B3A022C98EA11302D458295A4FA
                                                                                      SHA-512:ACC3DF6AA6025B45F06326062B2F0803BB6FD97AAAEBB276731E5DC5C496731C0853D54B2A4476A4A2EC2DD4FFDF69D78255FC8BCAB2412CE86925A94CE0559D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-1) {. {-9223372036854775808 3600 0 +01}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.919647975606158
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDINFedFkXGm2OHMUUJv:SlSWB9X5yRUNCm2OHXQ
                                                                                      MD5:566FBA546E6B7668830D1812659AE671
                                                                                      SHA1:EF3AF5CE0BB944973D5B2DCC872903F0C3B7F0FF
                                                                                      SHA-256:962E810E02BAE087AD969FEB91C07F2CBB868D09E1BA4A453EB4773F7897157A
                                                                                      SHA-512:F42BB5ACDE563A8A875D7B3F1C10CE9A5CE7E52FA9EF2D14BDA2C45BCD5A6D9B44227D079853551BAA13EAED32F4CA3C34BAD88E616B528DEF7DFAE7F42929CB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-10) {. {-9223372036854775808 36000 0 +10}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.958847614227257
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIVEXGm2OHlVVmv:SlSWB9X5yRUVLm2OHlVAv
                                                                                      MD5:02F46CC589D114C57B5687A703EB11C6
                                                                                      SHA1:5199683CC7E5D18ED686B44E94FB72EA8C978A9A
                                                                                      SHA-256:B1BEE376A0CBEA180391835DB97F8EB32873B2B58AD1AA1098E79FAC357799C5
                                                                                      SHA-512:A0CDDCD3208D096712868FED0557CDF5FEC5E9FA5FB25864129D2A9047BCD1AFAA8270C1E41368D32DE2A7B1B66157BDCFC17F8CDF3EF6A9F0C74B42814B096F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-11) {. {-9223372036854775808 39600 0 +11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.934250404386511
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIjWkXGm2OHwvv0UIvYv:SlSWB9X5yRUjCm2OHwvv0a
                                                                                      MD5:F6AF5C34BDE9FFF73F8B9631C0173EE9
                                                                                      SHA1:A717214203F4B4952AE12374AE78992084CD5A61
                                                                                      SHA-256:622E51EE9D4601DB90818F4B8E324F790F4D2405D66B899FC018A41E00473C0F
                                                                                      SHA-512:0B898328A19DA7FE1BD2FB161EF1511684B569E4262C8149A789855C6F86C84360BC9E6BF82BC571BD7C585A30E0658560029FCC7C3C180BC0D2EA1872860753
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-12) {. {-9223372036854775808 43200 0 +12}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.951215891260531
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIsXGm2OH1dNv74v:SlSWB9X5yRUjm2OHmv
                                                                                      MD5:B505D6A064B6D976BD1BDE61AE937F1C
                                                                                      SHA1:DBA0EA8DCCB50CC999397129369A340CA8A4C5B5
                                                                                      SHA-256:EF28D4D6DAFE3AB08BE1CE9C32FAF7BF8F750332DF0D39314131F88DF463DFAC
                                                                                      SHA-512:86A4CA670FBFFF95C9B22DA4E8957A4BE8A805457032AF47BDF08B5047881F692D665BEF8A76045EF50587149EDD52C8994A19CEE9675A3D12939D9CB9DE4649
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-13) {. {-9223372036854775808 46800 0 +13}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):112
                                                                                      Entropy (8bit):4.946259136243175
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIxmcXGm2OH0FVtQCn:SlSWB9X5yRUxmTm2OH8Jn
                                                                                      MD5:6BD2D15FA9AAF7F44D88BED0F6C969F3
                                                                                      SHA1:3080291F9C9C9422995583175C560338F626E4CD
                                                                                      SHA-256:748D443DA743D385497A43198A114BD8349310494ECC85F47D39745D53F6E291
                                                                                      SHA-512:651983293BAD1EDE1211EEAA3CAA28C73F84FFE2B8554CF198DF014BEF6B7413C4C49C3080FC73430804ECCA3D2BDB316B6B735B72E7BA3525B330E6A5352715
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-14) {. {-9223372036854775808 50400 0 +14}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):110
                                                                                      Entropy (8bit):4.8751066179878215
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDInHkXGm2OH/VXCYvn:SlSWB9X5yRUnLm2OH/VSC
                                                                                      MD5:DAE7D42076F09E2E2A51A58CC253837D
                                                                                      SHA1:44C587A71AE31A7424E0F2B005D11F9E0B463E80
                                                                                      SHA-256:9D0D3FAD960E9EBF599218213F3AE8A22766B6CB15C8CDBC7ABD8A3FFD75C29A
                                                                                      SHA-512:CEE724EEC6EC86FB417CD4D06B3FC17A404953CCE8740A03B024C05C0436340D9B056F3F1B2706284F57CC49FA229EE311D088AFE3D65F0BF946B0A18282ED46
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-2) {. {-9223372036854775808 7200 0 +02}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):111
                                                                                      Entropy (8bit):4.903159871492102
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIYdSXGm2OHkNsWYAvn:SlSWB9X5yRUGJm2OHkKWYAv
                                                                                      MD5:3CABCADD8398567F6489C263BF55CA89
                                                                                      SHA1:0981F225619E92D4B76ECB2C6D186156E46DA63D
                                                                                      SHA-256:74EEBD9C48312D68DC5E54B843FACF3DB869E214D37214F1096AF1D6ECF6D9AF
                                                                                      SHA-512:1FF86CFDAA407D7EFD0B0DBC32FC8ED03DAADF6D0D83463B4C6DA97B4B8D77FC381C4C140168AA06FA9A5444DDADBB39DBD8F22E4570EE86F2F7608AAFB0C7FC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-3) {. {-9223372036854775808 10800 0 +03}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):111
                                                                                      Entropy (8bit):4.92687099262498
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIbSXGm2OHkVsRYvC:SlSWB9X5yRUtm2OHkSQC
                                                                                      MD5:C157F79ADE92A69E46472EA921E1370F
                                                                                      SHA1:4B9E5AFA769D5BDF3FDF05BC24A6A632C6D86ECB
                                                                                      SHA-256:0606FBAB9374A74D4B2ED17DD04D9DCED7131768CCF673C5C3B739727743383F
                                                                                      SHA-512:B6814282465ABF4DF31341306050F11ECAAFC5915C420A8E7F8D787E66308C58FF7C348D6CBDB4064C346800564000C7C763BDD01CB8CE3A8A81550F65C9A74C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-4) {. {-9223372036854775808 14400 0 +04}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):111
                                                                                      Entropy (8bit):4.91086034871979
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDI7wkXGm2OHM0VQL:SlSWB9X5yRU7Em2OHnVQL
                                                                                      MD5:AF742680C5A3BA5981DD7F0646EF6CCA
                                                                                      SHA1:0753749D4636D561A8942BB1641BDBCC42349A9B
                                                                                      SHA-256:5E2D90AF8A161D47F30E1C4A0F5E1CAB5E9F24201557864A02D3009B1ECFEDE0
                                                                                      SHA-512:9B738675FC02613929BF90A7C78DD632AB782D20B5E660578AB590858D22BCD79E5AFB191D41E9DF94E2E586B5D2A163AB7D8364A02A5DE60E5B838F8B85D2FD
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-5) {. {-9223372036854775808 18000 0 +05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):111
                                                                                      Entropy (8bit):4.930155028450208
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIgwcXGm2OHETNSTL:SlSWB9X5yRUgwTm2OHETMn
                                                                                      MD5:298F4671F470C4628B3174D5D1D0608D
                                                                                      SHA1:5626202FB7186B4555C03F94CEE38AD0FAB81F40
                                                                                      SHA-256:19760989015244E4F39AC12C07E6665038AE08282DAF8D6DB0BB5E2F642C922D
                                                                                      SHA-512:F81B901249D3FAED3805471F256F55463A7A2FC8CB612FF95E698D63F9609D5D1B3B57DD87021C5DD809D971709EC3831351D54E971E25643B67161E9EAD5E25
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-6) {. {-9223372036854775808 21600 0 +06}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):111
                                                                                      Entropy (8bit):4.883134479361256
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIu/kXGm2OHAXUVSYvC:SlSWB9X5yRUuTm2OHAXUVSYvC
                                                                                      MD5:2317D02708980D7F17B1A4BDE971D15F
                                                                                      SHA1:2E78CDE3608F6B03DEB534D14D069D3D89DE85EF
                                                                                      SHA-256:0BF01EEEBAA49CE9859C2A5835C6A826B158A7BC3B14C473FBB0167ABA9EA4B9
                                                                                      SHA-512:21083EAEACD689FD07D458DB82BC2559445A1C558EB8BAF098B71CFD3A599BB756336F847CBE536648AF473E22E0000B2A8C44A45D0866994F03A78D4E841FC5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-7) {. {-9223372036854775808 25200 0 +07}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):111
                                                                                      Entropy (8bit):4.8680235243759755
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIlEXGm2OHN/VsdYK:SlSWB9X5yRUlLm2OHUJ
                                                                                      MD5:B940D187558341DBF4D619248C13C7CA
                                                                                      SHA1:0C6B11AA9DBC0A395345F79B4B7325FBE870A414
                                                                                      SHA-256:DAB4C0E14D2850BF917C5891E864834CA4BFD38D5470F119F529582976551862
                                                                                      SHA-512:042176822D8BFD72FFC0727176596430B656E4986636E9869F883B7078389F936EFA8CCFA9BA7ED0963899BD7D134DB9CD25F24C42040781CC37F2701D0CA28A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-8) {. {-9223372036854775808 28800 0 +08}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):111
                                                                                      Entropy (8bit):4.91213701043219
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRDIedSXGm2OHENScCC:SlSWB9X5yRUwJm2OHsScCC
                                                                                      MD5:DD58339761ECF5503A48267CFD8E3837
                                                                                      SHA1:B58511A80448D74B38365EA537BBE0D21956F0E2
                                                                                      SHA-256:383EFE43E20963058BFCD852813BDA3FCCC0B4A7AC26317E621589B4C97C1B90
                                                                                      SHA-512:C865244051882FD141D369435CFEED0A1E1D254C0313C1EFE55F5AF72412BE11F2B76484170B94BC4E9FCC0D2EEC373D523732FF7945999717D5827FCE68F54F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/GMT-9) {. {-9223372036854775808 32400 0 +09}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):153
                                                                                      Entropy (8bit):4.836974611939794
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtyRDVMFHp8RDMvn:SlSWB9IZaM3yF4FVAIgJtyRC1p8RQvn
                                                                                      MD5:BE8C5C3B3DACB97FADEB5444976AF56A
                                                                                      SHA1:A0464B66E70A1AF7963D2BE7BC1D88E5842EC99A
                                                                                      SHA-256:89F4624DC69DE64B7AF9339FE17136A88A0C28F5F300575540F8953B4A621451
                                                                                      SHA-512:A0E11D9DF5AD2C14A012E82F24298921780E091EEDD680535658F9CD1337A4103BA0676DF9B58865DD7D2CFA96AEED7BF786B88786FAF31B06713D61B4C0308A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Etc/GMT0) $TZData(:Etc/GMT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):158
                                                                                      Entropy (8bit):4.862741414606617
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtyRp+FB5yRDMvn:SlSWB9IZaM3yF4FVAIgJtyRp6BURQvn
                                                                                      MD5:2DADDAD47A64889162132E8DA0FFF54F
                                                                                      SHA1:EC213743939D699A4EE4846E582B236F8C18CB29
                                                                                      SHA-256:937970A93C2EB2D73684B644E671ACA5698BCB228810CC9CF15058D555347F43
                                                                                      SHA-512:CA8C45BA5C1AF2F9C33D6E35913CED14B43A7AA37300928F14DEF8CB5E7D56B58968B9EE219A0ACCB4C17C52F0FBD80BD1018EF5426C137628429C7DAA41ACA2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Etc/Greenwich) $TZData(:Etc/GMT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):105
                                                                                      Entropy (8bit):4.857741203314798
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yR5FkXGm2OHv1CCn:SlSWB9X5yRHm2OHNLn
                                                                                      MD5:415F102602AFB6F9E9F2B58849A32CC9
                                                                                      SHA1:002C7D99EBAA57E8599090CFBF39B8BEAABE4635
                                                                                      SHA-256:549D4CC4336D35143A55A09C96FB9A36227F812CA070B2468BD3BB6BB4F1E58F
                                                                                      SHA-512:6CA28E71F941D714F3AACA619D0F4FEEF5C35514E05953807C225DF976648F257D835B59A03991D009F738C6FD94EB50B4ECA45A011E63AFDCA537FBAC2B6D1B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/UCT) {. {-9223372036854775808 0 0 UCT}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):105
                                                                                      Entropy (8bit):4.857741203314798
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5yRF3dFkXGm2OHvr:SlSWB9X5yR9dJm2OHj
                                                                                      MD5:6343442DDDC19AF39CADD82AC1DDA9BD
                                                                                      SHA1:9D20B726C012F14D99E701A69C60F81CB33E9DA6
                                                                                      SHA-256:48B88EED5EF95011F41F5CA7DF48B6C71BED711B079E1132B2C1CD538947EF64
                                                                                      SHA-512:4CFED8C80D9BC2A75D4659A14F22A507CF55D3DCC88318025BCB8C99AE7909CAF1F11B1ADC363EF007520BF09473CB68357644E41A9BBDAF9DB0B0A44ECC4FBF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Etc/UTC) {. {-9223372036854775808 0 0 UTC}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):158
                                                                                      Entropy (8bit):4.825049978035721
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLyRYzXDJMFfh8RFu:SlSWB9IZaM3yzUFVAIgBLyRY7VMr8RI
                                                                                      MD5:7BE0766999E671DDD5033A61A8D84683
                                                                                      SHA1:D2D3101E78919EB5FE324FFC85503A25CFD725E0
                                                                                      SHA-256:90B776CF712B8FE4EEC587410C69A0EC27417E79006132A20288A9E3AC5BE896
                                                                                      SHA-512:A4CA58CD4DC09393BBE3C43D0B5E851DEBEEDC0C5CEC7DCED4D24C14796FD336D5607B33296985BD14E7660DCE5C85C0FB625B2F1AD9AC10F1631A76ECEB04B8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:Etc/Universal) $TZData(:Etc/UTC).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):153
                                                                                      Entropy (8bit):4.824450775594084
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLyRaQEBURFu:SlSWB9IZaM3yzUFVAIgBLyRYaRI
                                                                                      MD5:64ED445C4272D11C85BD2CFC695F180F
                                                                                      SHA1:EDE76B52D3EEBCC75C50E17C053009A453D60D42
                                                                                      SHA-256:A68D32DA2214B81D1C0C318A5C77975DE7C4E184CB4D60F07858920B11D065FE
                                                                                      SHA-512:4CE8FC2B7C389BD2058CE77CD7234D4EA3F81F40204C9190BF0FB6AA693FB40D0638BFB0EB0D9FA20CB88804B73F6EE8202439C1F553B1293C6D2E5964216A1D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:Etc/Zulu) $TZData(:Etc/UTC).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8792
                                                                                      Entropy (8bit):3.8152682180965747
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:nK5UUH6mek6EvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVab:K5VfSTRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:C107BB0AC411789418982B201FF1F857
                                                                                      SHA1:71691B3E9FCC3503943BAFD872A881C1F1EE8451
                                                                                      SHA-256:2794B605AE149FFB58D88508A663BB54034FD542BF14B56DAE62801971612F5B
                                                                                      SHA-512:BFC79B3245526ED54615F613D3158DC4CF44DAF3DB758DBA65977EC91263CEFFA628D36E7CA536E140AF727EC321D9047C36D56303718D1EC5B49F5A8BCAE2E9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Amsterdam) {. {-9223372036854775808 1172 0 LMT}. {-4260212372 1172 0 AMT}. {-1693700372 4772 1 NST}. {-1680484772 1172 0 AMT}. {-1663453172 4772 1 NST}. {-1650147572 1172 0 AMT}. {-1633213172 4772 1 NST}. {-1617488372 1172 0 AMT}. {-1601158772 4772 1 NST}. {-1586038772 1172 0 AMT}. {-1569709172 4772 1 NST}. {-1554589172 1172 0 AMT}. {-1538259572 4772 1 NST}. {-1523139572 1172 0 AMT}. {-1507501172 4772 1 NST}. {-1490566772 1172 0 AMT}. {-1470176372 4772 1 NST}. {-1459117172 1172 0 AMT}. {-1443997172 4772 1 NST}. {-1427667572 1172 0 AMT}. {-1406672372 4772 1 NST}. {-1396217972 1172 0 AMT}. {-1376950772 4772 1 NST}. {-1364768372 1172 0 AMT}. {-1345414772 4772 1 NST}. {-1333318772 1172 0 AMT}. {-1313792372 4772 1 NST}. {-1301264372 1172 0 AMT}. {-1282256372 4772 1 NST}. {-1269814772 1172 0 AMT}. {-1250720372 4772 1 NST}. {-123836517
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6690
                                                                                      Entropy (8bit):3.730744509734253
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:u7rRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyzF76:uXRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:13F10BC59FB9DBA47750CA0B3BFA25E9
                                                                                      SHA1:992E50F4111D55FEBE3CF8600F0B714E22DD2B16
                                                                                      SHA-256:E4F684F28AD24B60E21707820C40A99E83431A312D26E6093A198CB344C249DC
                                                                                      SHA-512:DA5255BDE684BE2C306C6782A61DE38BFCF9CFF5FD117EBDE5EF364A5ED76B5AB88E6F7E08337EEB2CEC9CB03238D9592941BDAA01DFB061F21085D386451AFA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Andorra) {. {-9223372036854775808 364 0 LMT}. {-2177453164 0 0 WET}. {-733881600 3600 0 CET}. {481078800 7200 0 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}. {622602000 3600 0 CET}. {638326800 7200 1 CEST}. {654656400 3600 0 CET}. {670381200 7200 1 CEST}. {686106000 3600 0 CET}. {701830800 7200 1 CEST}. {717555600 3600 0 CET}. {733280400 7200 1 CEST}. {749005200 3600 0 CET}. {764730000 7200 1 CEST}. {780454800 3600 0 CET}. {796179600 7200 1 CEST}. {811904400 3600 0 CET}. {828234000 7200 1 CEST}. {846378000 3600 0 CET}. {859683600 7200 1 CEST}. {877827600 3600 0 CET}. {891133200 7200 1 CEST}. {909277200 3600 0 CET}. {922582800 7200 1 CEST}. {941331600 3600 0 CET}. {9540
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1992
                                                                                      Entropy (8bit):3.5867428099003957
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:ce0exLWtjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkw/O2blbEUhtCUH9mt:iDTZVemFLN7NBx333+ix6b0JiGef
                                                                                      MD5:103F48F9DDAC5D94F2BECDA949DE5E50
                                                                                      SHA1:0582454439DD4E8D69E7E8EE9B8A3F041F062E89
                                                                                      SHA-256:823A0A0DBA01D9B34794EB276F9ABB9D2EC1E60660B20EAA2BA097884E3934F2
                                                                                      SHA-512:7419A8F5CF49BE76D7CD7D070FF4467CED851EC76E38A07BD590ED64B96DA446968195096DE2F8298C448778E0A40CAE717C8F234CCDBDF5C3C21B7D056EA4C1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Astrakhan) {. {-9223372036854775808 11532 0 LMT}. {-1441249932 10800 0 +03}. {-1247540400 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 18000 1 +05}. {591141600 14400 0 +04}. {606866400 10800 0 +04}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 14400 0 +04}. {701820000 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800 14400 1 +04}. {780447600 10800 0 +03}. {7961724
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7686
                                                                                      Entropy (8bit):3.635151038354021
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:JAK3+9wAuy+Hk+PVqVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2l:JAKOK1XPzh2kNU4tB715pyzHy1gA
                                                                                      MD5:D64695F05822EF0DF9E3762A1BC440A0
                                                                                      SHA1:F17F03CFD908753E28F2C67D2C8649B8E24C35F7
                                                                                      SHA-256:118289C1754C06024B36AE81FEE96603D182CB3B8D0FE0A7FD16AD34DB81374D
                                                                                      SHA-512:3C5BDE2004D6499B46D9BAB8DBFDCC1FC2A729EEA4635D8C6CB4279AEE9B5655CE93D2E3F09B3E7295468007FFB5BE6FEC5429501E8FB4D3C2BCC05177C2158A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Athens) {. {-9223372036854775808 5692 0 LMT}. {-2344642492 5692 0 AMT}. {-1686101632 7200 0 EET}. {-1182996000 10800 1 EEST}. {-1178161200 7200 0 EET}. {-906861600 10800 1 EEST}. {-904878000 7200 0 CEST}. {-857257200 3600 0 CET}. {-844477200 7200 1 CEST}. {-828237600 3600 0 CET}. {-812422800 7200 0 EET}. {-552362400 10800 1 EEST}. {-541652400 7200 0 EET}. {166485600 10800 1 EEST}. {186184800 7200 0 EET}. {198028800 10800 1 EEST}. {213753600 7200 0 EET}. {228873600 10800 1 EEST}. {244080000 7200 0 EET}. {260323200 10800 1 EEST}. {275446800 7200 0 EET}. {291798000 10800 1 EEST}. {307407600 7200 0 EET}. {323388000 10800 1 EEST}. {338936400 7200 0 EET}. {347148000 7200 0 EET}. {354675600 10800 1 EEST}. {370400400 7200 0 EET}. {386125200 10800 1 EEST}. {401850000 7200 0 EET}. {417574800 10800 1 EEST}. {433299600 7200 0 EET}. {4490
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):177
                                                                                      Entropy (8bit):4.827362756219521
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6yQahs3QavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUy70U
                                                                                      MD5:19134F27463DEDF7E25BC72E031B856F
                                                                                      SHA1:40D9E60D26C592ED79747D1253A9094FCDE5FD33
                                                                                      SHA-256:5D31D69F259B5B2DFE016EB1B2B811BD51A1ED93011CBB34D2CF65E4806EB819
                                                                                      SHA-512:B80202194A9D547AEC3B845D267736D831FB7E720E171265AC3F0074C8B511518952BF686A235E6DDEFC11752C3BD8A48A184930879B68980AC60E9FAECBFB44
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:Europe/Belfast) $TZData(:Europe/London).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7059
                                                                                      Entropy (8bit):3.733102701717456
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:TX6TRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyzF76:TWRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:841E21EED6229503BF41A858601453B0
                                                                                      SHA1:6F5632B23F2C710106211FBCD2C17DC40B026BFB
                                                                                      SHA-256:813B4B4F13401D4F92B0F08FC1540936CCFF91EFD8B8D1A2C5429B23715C2748
                                                                                      SHA-512:85863B12F17A4F7FAC14DF4D3AB50CE33C7232A519F7F10CC521AC0F695CD645857BD0807F0A9B45C169DD7C1240E026C567B35D1D157EE3DB3C80A57063E8FE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Belgrade) {. {-9223372036854775808 4920 0 LMT}. {-2713915320 3600 0 CET}. {-905824800 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-788922000 3600 0 CET}. {-777942000 7200 1 CEST}. {-766623600 3600 0 CET}. {407199600 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}. {622602000 3600 0 CET}. {638326800 7200 1 CEST}. {654656400 3600 0 CET}. {670381200 7200 1 CEST}. {686106000 3600 0 CET}. {701830800 7200 1 CEST}. {717555600 3600 0 CET}. {733280400 7200 1 CES
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7746
                                                                                      Entropy (8bit):3.733442486698092
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:hgt67dAtcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAT:hiGRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:D1E45A4660E00A361729FCD7413361C1
                                                                                      SHA1:BCC709103D07748E909DD999A954DFF7034F065F
                                                                                      SHA-256:EAD23E3F58706F79584C1F3F9944A48670F428CACBE9A344A52E19B541AB4F66
                                                                                      SHA-512:E3A0E6B4FC80A8D0215C81E95F9D3F71C0D9371EE0F6B2B7E966744C42FC64055370D322918EEA2917BFBA07030629C4493ADA257F9BD9C9BF6AD3C4A7FB1E70
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Berlin) {. {-9223372036854775808 3208 0 LMT}. {-2422054408 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 1 CEST}. {-776559600 10800 0 CEMT}. {-765936000 7200 1 CEST}. {-761180400 3600 0 CET}. {-757386000 3600 0 CET}. {-748479600 7200 1 CEST}. {-733273200 3600 0 CET}. {-717631200 7200 1 CEST}. {-714610800 10800 1 CEMT}. {-710380800 7200 1 CEST}. {-701910000 3600 0 CET}. {-684975600 7200 1 CEST}. {-670460400 3600 0 CET}. {-654130800 7200 1 CEST}. {-639010800 3600 0 CET}. {315529200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):180
                                                                                      Entropy (8bit):4.89628096026481
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVtXrAevFVAIgoquXrELyQahcvEB5yQazXrY:SlSWB9IZaM3ymzbAevFVAIgozbELy7cY
                                                                                      MD5:7C0606BC846344D78A85B4C14CE85B95
                                                                                      SHA1:CEDFDC3C81E519413DDD634477533C89E8AF2E35
                                                                                      SHA-256:D7DF89C23D2803683FE3DB57BF326846C9B50E8685CCCF4230F24A5F4DC8E44E
                                                                                      SHA-512:8F07791DE5796B418FFD8945AE13BAB1C9842B8DDC073ED64E12EA8985619B93472C39DD44DA8FAEF5614F4E6B4A9D96E0F52B4ECA11B2CCA9806D2F8DDF2778
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Prague)]} {. LoadTimeZoneFile Europe/Prague.}.set TZData(:Europe/Bratislava) $TZData(:Europe/Prague).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8907
                                                                                      Entropy (8bit):3.75854119398076
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:BMlf+jdXtSYv9HMn2vDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHL:BMQSY1RSTRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:FA802B103E8829C07AE7E05DE7F3CD1F
                                                                                      SHA1:46AFB26E3E9102F0544C5294DA67DC41E8B2E8FC
                                                                                      SHA-256:AEB5860C2F041842229353E3F83CC2FEBC9518B115F869128E94A1605FB4A759
                                                                                      SHA-512:488CE6B524071D2B72F8AD73C2DC00F5F4C1C3C93F91165BDA0BCCB2B2C644B792C4220B785E84835ABE81584FDC87A1DCDA7679A69318052C3854167CB43C61
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Brussels) {. {-9223372036854775808 1050 0 LMT}. {-2840141850 1050 0 BMT}. {-2450953050 0 0 WET}. {-1740355200 3600 0 CET}. {-1693702800 7200 0 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1613826000 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585530000 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552266000 0 0 WET}. {-1539997200 3600 1 WEST}. {-1520557200 0 0 WET}. {-1507510800 3600 1 WEST}. {-1490576400 0 0 WET}. {-1473642000 3600 1 WEST}. {-1459126800 0 0 WET}. {-1444006800 3600 1 WEST}. {-1427677200 0 0 WET}. {-1411952400 3600 1 WEST}. {-1396227600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364778000 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333328400 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301263200 0 0 WET}. {-1284328800 3600 1 WEST}. {-126
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7706
                                                                                      Entropy (8bit):3.6365022673390808
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:nQrdI+sYixX215VaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtk:nQrbEm1Oh2kNU4tB715pyzHy1gA
                                                                                      MD5:79AAB44507DD6D06FA673CA20D4CF223
                                                                                      SHA1:A2F1AA0E3F38EF24CD953C6B5E1EC29EA3EDB8C0
                                                                                      SHA-256:C40DC0C9EE5FFF9F329823325A71F3F38BE940F159E64E0B0CED27B280C1F318
                                                                                      SHA-512:BBEBB29FFD35A1F8B9D906795032976B3F69A0097ED7D764E3EB45574E66641C35F9006B3295FB090472FF5C09FC4D88D9249E924011A178EFB68D050AA6F871
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Bucharest) {. {-9223372036854775808 6264 0 LMT}. {-2469404664 6264 0 BMT}. {-1213148664 7200 0 EET}. {-1187056800 10800 1 EEST}. {-1175479200 7200 0 EET}. {-1159754400 10800 1 EEST}. {-1144029600 7200 0 EET}. {-1127700000 10800 1 EEST}. {-1111975200 7200 0 EET}. {-1096250400 10800 1 EEST}. {-1080525600 7200 0 EET}. {-1064800800 10800 1 EEST}. {-1049076000 7200 0 EET}. {-1033351200 10800 1 EEST}. {-1017626400 7200 0 EET}. {-1001901600 10800 1 EEST}. {-986176800 7200 0 EET}. {-970452000 10800 1 EEST}. {-954727200 7200 0 EET}. {296604000 10800 1 EEST}. {307486800 7200 0 EET}. {323816400 10800 1 EEST}. {338940000 7200 0 EET}. {354672000 10800 0 EEST}. {370396800 7200 0 EET}. {386121600 10800 1 EEST}. {401846400 7200 0 EET}. {417571200 10800 1 EEST}. {433296000 7200 0 EET}. {449020800 10800 1 EEST}. {465350400 7200 0 EET}. {481075200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7975
                                                                                      Entropy (8bit):3.7352769955376464
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:ZpduGm56n0PcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQlth:ZpMypRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:25864F8E5372B8E45B71D08667ED093C
                                                                                      SHA1:83463D25C839782E2619CD5BE613DA1BD08ACBB5
                                                                                      SHA-256:EF5CF8C9B3CA3F772A9C757A2CC1D561E00CB277A58E43ED583A450BBA654BF1
                                                                                      SHA-512:0DAB3CA0C82AA80A4F9CC04C191BE180EB41CCF87ADB31F26068D1E6A3A2F121678252E36E387B589552E6F7BA965F7E3F4633F1FD066FC7849B1FD554F39EC7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Budapest) {. {-9223372036854775808 4580 0 LMT}. {-2500938980 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1640998800 3600 0 CET}. {-1633212000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1600466400 7200 1 CEST}. {-1581202800 3600 0 CET}. {-906771600 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-788922000 3600 0 CET}. {-778471200 7200 1 CEST}. {-762660000 3600 0 CET}. {-749689200 7200 1 CEST}. {-733359600 3600 0 CET}. {-717634800 7200 1 CEST}. {-701910000 3600 0 CET}. {-686185200 7200 1 CEST}. {-670460400 3600 0 CET}. {-654130800 7200 1 CEST}. {-639010800 3600 0 CET}. {-621990000 7200 1 CEST}. {-605660400 3600 0 CET}. {-492656400 7200 1 CEST}. {-481168800 3600 0
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):178
                                                                                      Entropy (8bit):4.905738881351689
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVnCMPwVAIgoqkCMJW6yQahDZALMFB5h8Qa5CMP:SlSWB9IZaM3ym5XwVAIgo5Py7D17/8jH
                                                                                      MD5:811B7E0B0EDD151E52DF369B9017E7C0
                                                                                      SHA1:3C17D157A626F3AD7859BC0F667E0AB60E821D05
                                                                                      SHA-256:221C8BA73684ED7D8CD92978ED0A53A930500A2727621CE1ED96333787174E82
                                                                                      SHA-512:7F980E34BBCBC65BBF04526BF68684B3CE780611090392560569B414978709019D55F69368E98ADADC2C47116818A437D5C83F4E6CD40F4A1674D1CF90307CB5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Zurich)]} {. LoadTimeZoneFile Europe/Zurich.}.set TZData(:Europe/Busingen) $TZData(:Europe/Zurich).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7824
                                                                                      Entropy (8bit):3.674889638637008
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:J2rdkayurpKXlGYtXfVA6bN3E48WLCtSYxUFtj2DVXvR2YuXOZp+eiXGEsTVVHU:J2r6G81T9bN3E48GCujWYqK
                                                                                      MD5:92966EE642028D4C44C90F86CA1440AA
                                                                                      SHA1:95F286585FF3A880F2F909E82F4C22C8F1D12BE3
                                                                                      SHA-256:E92FFABF4705F93C2A4AD675555AEBC3C9418AC71EEB487AF0F7CD4EAB0431CE
                                                                                      SHA-512:1D6018C83CA5998C590448FE98C59F3FCD0D5D7688B679B7F3C82B6F3209F25323BB302BF847FCCBD950F08A79AF36CA83DBDD4DB8A3557A682152A6B731B663
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Chisinau) {. {-9223372036854775808 6920 0 LMT}. {-2840147720 6900 0 CMT}. {-1637114100 6264 0 BMT}. {-1213148664 7200 0 EET}. {-1187056800 10800 1 EEST}. {-1175479200 7200 0 EET}. {-1159754400 10800 1 EEST}. {-1144029600 7200 0 EET}. {-1127700000 10800 1 EEST}. {-1111975200 7200 0 EET}. {-1096250400 10800 1 EEST}. {-1080525600 7200 0 EET}. {-1064800800 10800 1 EEST}. {-1049076000 7200 0 EET}. {-1033351200 10800 1 EEST}. {-1017626400 7200 0 EET}. {-1001901600 10800 1 EEST}. {-986176800 7200 0 EET}. {-970452000 10800 1 EEST}. {-954727200 7200 0 EET}. {-927165600 10800 1 EEST}. {-898138800 7200 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-800154000 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {4179
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7458
                                                                                      Entropy (8bit):3.736544358182077
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:1Fpd6z8cRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyo:1FpoRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:8FBF425E5833012C0A6276222721A106
                                                                                      SHA1:78C5788ED4184A62E0E2986CC0F39EED3801AD76
                                                                                      SHA-256:D2D091740C425C72C46ADDC23799FC431B699B80D244E4BCD7F42E31C1238EEB
                                                                                      SHA-512:6DF08142EEBC7AF8A575DD7510B83DBD0E15DDA13801777684355937338CDA3D09E37527912F4EBBCC1B8758E3D65185E6006EB5C1349D1DC3AE7B6131105691
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Copenhagen) {. {-9223372036854775808 3020 0 LMT}. {-2524524620 3020 0 CMT}. {-2398294220 3600 0 CET}. {-1692496800 7200 1 CEST}. {-1680490800 3600 0 CET}. {-935110800 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 0 CEST}. {-769388400 3600 0 CET}. {-747010800 7200 1 CEST}. {-736383600 3600 0 CET}. {-715215600 7200 1 CEST}. {-706748400 3600 0 CET}. {-683161200 7200 1 CEST}. {-675298800 3600 0 CET}. {315529200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {401850000 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9452
                                                                                      Entropy (8bit):3.675115548319436
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:fIfr7ZO/H8XKKRg3psTZ+wfAIt3/LIjzI9jJeK:fIHZO/Hk5RmpsT7/sjzI9jJeK
                                                                                      MD5:D9787AD03D1A020F01FFF1F9AB346C09
                                                                                      SHA1:C194A0A7F218ABBEB7DB53E3B2062DC349A8C739
                                                                                      SHA-256:E1DCBC878C8937FBE378033AEE6B0D8C72827BE3D9C094815BFA47AF92130792
                                                                                      SHA-512:4C596C9BDE55605381C9B6F90837BA8C9EA2992EBC7F3ACDC207CFAE7612E8B13415FD4962DC8D3FD2A75D98025D0E052B8B8486F6C31742D791C6A2C1D1827F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Dublin) {. {-9223372036854775808 -1500 0 LMT}. {-2821649700 -1521 0 DMT}. {-1691962479 2079 1 IST}. {-1680471279 0 0 GMT}. {-1664143200 3600 1 BST}. {-1650146400 0 0 GMT}. {-1633903200 3600 1 BST}. {-1617487200 0 0 GMT}. {-1601848800 3600 1 BST}. {-1586037600 0 0 GMT}. {-1570399200 3600 1 BST}. {-1552168800 0 0 GMT}. {-1538344800 3600 1 BST}. {-1522533600 0 0 GMT}. {-1517011200 0 0 IST}. {-1507500000 3600 1 IST}. {-1490565600 0 0 IST}. {-1473631200 3600 1 IST}. {-1460930400 0 0 IST}. {-1442786400 3600 1 IST}. {-1428876000 0 0 IST}. {-1410732000 3600 1 IST}. {-1396216800 0 0 IST}. {-1379282400 3600 1 IST}. {-1364767200 0 0 IST}. {-1348437600 3600 1 IST}. {-1333317600 0 0 IST}. {-1315778400 3600 1 IST}. {-1301263200 0 0 IST}. {-1284328800 3600 1 IST}. {-1269813600 0 0 IST}. {-1253484000 3600 1 IST}. {-1238364000 0 0 IST}. {-
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9181
                                                                                      Entropy (8bit):3.7982744899840535
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:i2elBN44y3UKdDDMjEZtcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIV0:i44y1xZGRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:F8AEFE8F561ED7E1DC81117676F7D0E0
                                                                                      SHA1:1148176C2766B205B5D459A620D736B1D28283AA
                                                                                      SHA-256:FB771A01326E1756C4026365BEE44A6B0FEF3876BF5463EFAB7CF4B97BF87CFC
                                                                                      SHA-512:7C06CB215B920911E0DC9D24F0DD6E24DEC3D75FB2D0F175A9B4329304C9761FFFEE329DD797FF4343B41119397D7772D1D3DFC8F90C1DE205380DE463F42854
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Gibraltar) {. {-9223372036854775808 -1284 0 LMT}. {-2821649916 0 0 GMT}. {-1691964000 3600 1 BST}. {-1680472800 0 0 GMT}. {-1664143200 3600 1 BST}. {-1650146400 0 0 GMT}. {-1633903200 3600 1 BST}. {-1617487200 0 0 GMT}. {-1601848800 3600 1 BST}. {-1586037600 0 0 GMT}. {-1570399200 3600 1 BST}. {-1552168800 0 0 GMT}. {-1538344800 3600 1 BST}. {-1522533600 0 0 GMT}. {-1507500000 3600 1 BST}. {-1490565600 0 0 GMT}. {-1473631200 3600 1 BST}. {-1460930400 0 0 GMT}. {-1442786400 3600 1 BST}. {-1428876000 0 0 GMT}. {-1410732000 3600 1 BST}. {-1396216800 0 0 GMT}. {-1379282400 3600 1 BST}. {-1364767200 0 0 GMT}. {-1348437600 3600 1 BST}. {-1333317600 0 0 GMT}. {-1315778400 3600 1 BST}. {-1301263200 0 0 GMT}. {-1284328800 3600 1 BST}. {-1269813600 0 0 GMT}. {-1253484000 3600 1 BST}. {-1238364000 0 0 GMT}. {-1221429600 3600 1 BST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):178
                                                                                      Entropy (8bit):4.830450830776494
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6yQakQAL/yQavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUyYL5
                                                                                      MD5:DC2B3CAC4AF70A61D0F4C53288CC8D11
                                                                                      SHA1:A423E06F88FDEED1960AF3C46A67F1CB9F293CAF
                                                                                      SHA-256:9CB6E6FEC9461F94897F0310BFC3682A1134E284A56C729E7F4BCE726C2E2380
                                                                                      SHA-512:8B455DA1D1A7AA1259E6E5A5CF90E62BA8073F769DCB8EB82503F2DFB70AA4539A688DC798880339A2722AA1871E8C8F16D8827064A2D7D8F2F232880359C78D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:Europe/Guernsey) $TZData(:Europe/London).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7120
                                                                                      Entropy (8bit):3.635790220811118
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:wQbXHk+PVqVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEZ9A:w6XPzh2kNU4tB715pyzHy1gA
                                                                                      MD5:E7A6AA8962067EF71174CD5AE79A8624
                                                                                      SHA1:1250689DF0DFCCDD4B6B21C7867C4AA515D19ECD
                                                                                      SHA-256:5FDBE427BC604FAC03316FD08138F140841C8CF2537CDF4B4BB20F2A9DFC4ECB
                                                                                      SHA-512:5C590164499C4649D555F30054ECB5CF627CCCA8A9F94842328E90DD40477CADB1042D07EA4C368ABB7094D7A59A8C2EE7619E5B3458A0FAC066979B14AF44A6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Helsinki) {. {-9223372036854775808 5989 0 LMT}. {-2890258789 5989 0 HMT}. {-1535938789 7200 0 EET}. {-875671200 10800 1 EEST}. {-859773600 7200 0 EET}. {354672000 10800 1 EEST}. {370396800 7200 0 EET}. {386121600 10800 1 EEST}. {401846400 7200 0 EET}. {410220000 7200 0 EET}. {417574800 10800 1 EEST}. {433299600 7200 0 EET}. {449024400 10800 1 EEST}. {465354000 7200 0 EET}. {481078800 10800 1 EEST}. {496803600 7200 0 EET}. {512528400 10800 1 EEST}. {528253200 7200 0 EET}. {543978000 10800 1 EEST}. {559702800 7200 0 EET}. {575427600 10800 1 EEST}. {591152400 7200 0 EET}. {606877200 10800 1 EEST}. {622602000 7200 0 EET}. {638326800 10800 1 EEST}. {654656400 7200 0 EET}. {670381200 10800 1 EEST}. {686106000 7200 0 EET}. {701830800 10800 1 EEST}. {717555600 7200 0 EET}. {733280400 10800 1 EEST}. {749005200 7200 0 EET}. {764730000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.866592240835745
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6yQaqpfioxp8QavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUycqO
                                                                                      MD5:9E18F66C32ADDDBCEDFE8A8B2135A0AC
                                                                                      SHA1:9D2DC5BE334B0C6AEA15A98624321D56F57C3CB1
                                                                                      SHA-256:6A03679D9748F4624078376D1FD05428ACD31E7CABBD31F4E38EBCCCF621C268
                                                                                      SHA-512:014BAD4EF0209026424BC68CBF3F5D2B22B325D61A4476F1E4F020E1EF9CD4B365213E01C7EC6D9D40FA422FE8FE0FADB1E4CBB7D46905499691A642D813A379
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:Europe/Isle_of_Man) $TZData(:Europe/London).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3974
                                                                                      Entropy (8bit):3.7140382290341214
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:kICNapz9QnPPWDeP/vamdc2MKJ9k2gsh6YlnG:kuQnPo+CWJipP
                                                                                      MD5:5F2F14127F11060A57C53565A24CB8F8
                                                                                      SHA1:E79FC982C018CC7E3C29A956048ED3D0CFFE3311
                                                                                      SHA-256:EAD62B6D04AA7623B9DF94D41E04C9E30C7BA8EB2CE3504105A0496A66EB87AE
                                                                                      SHA-512:E709849DEF7F7CDAE3CA44F1939DF49D6FE5DE9C89F541343256FC0F7B9E55390AC496FF599D94B7F594D6BAE724AE4608A43F5870C18210525B061E801CC36B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Istanbul) {. {-9223372036854775808 6952 0 LMT}. {-2840147752 7016 0 IMT}. {-1869875816 7200 0 EET}. {-1693706400 10800 1 EEST}. {-1680490800 7200 0 EET}. {-1570413600 10800 1 EEST}. {-1552186800 7200 0 EET}. {-1538359200 10800 1 EEST}. {-1522551600 7200 0 EET}. {-1507514400 10800 1 EEST}. {-1490583600 7200 0 EET}. {-1440208800 10800 1 EEST}. {-1428030000 7200 0 EET}. {-1409709600 10800 1 EEST}. {-1396494000 7200 0 EET}. {-931140000 10800 1 EEST}. {-922762800 7200 0 EET}. {-917834400 10800 1 EEST}. {-892436400 7200 0 EET}. {-875844000 10800 1 EEST}. {-857358000 7200 0 EET}. {-781063200 10800 1 EEST}. {-764737200 7200 0 EET}. {-744343200 10800 1 EEST}. {-733806000 7200 0 EET}. {-716436000 10800 1 EEST}. {-701924400 7200 0 EET}. {-684986400 10800 1 EEST}. {-670474800 7200 0 EET}. {-654141600 10800 1 EEST}. {-639025200 7200 0 EET}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):176
                                                                                      Entropy (8bit):4.831245786685746
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6yQap6cEBx/yQavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUyzO5
                                                                                      MD5:F43ABA235B8B98F5C64181ABD1CEEC3A
                                                                                      SHA1:A4A7D71ED148FBE53C2DF7497A89715EB24E84B7
                                                                                      SHA-256:8E97798BE473F535816D6D9307B85102C03CC860D3690FE59E0B7EEF94D62D54
                                                                                      SHA-512:B0E0FC97F08CB656E228353594FC907FC94A998859BB22648BF78043063932D0FC7282D31F63FCB79216218695B5DCDF298C37F0CB206160798CF3CA2C7598E1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:Europe/Jersey) $TZData(:Europe/London).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2397
                                                                                      Entropy (8bit):3.8622541648513464
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:cGv6a621nwJ2JoJrv0WvXlnDqVV0Qv3LEevBFoBGrjI9q1F008bBJd8:cGvt67yurvxXl6V/DYtX6
                                                                                      MD5:FE44AD99AF96A031D21D308B0E534928
                                                                                      SHA1:36A666585D0895155D31A6E5AFD6B7395C7334AA
                                                                                      SHA-256:0C65366AB59C4B8734DE0F69E7081269A367116363EB3863D16FB7184CCC5EB9
                                                                                      SHA-512:2789E8FC8FD73A0D3C915F5CBAD158D2A4995EE51607C4368F3AE1CC6418E93E204E4FCE6F796CDC60BB2E0ED8F79650DA4549C7663589B58E189D0D10F059C5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Kaliningrad) {. {-9223372036854775808 4920 0 LMT}. {-2422056120 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-788922000 7200 0 CET}. {-778730400 10800 1 CEST}. {-762663600 7200 0 CET}. {-757389600 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7202
                                                                                      Entropy (8bit):3.6738341956502953
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:j/fE2JyurpyVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEZ2:j/fN8GHh2kNU4tB715pyzHy1gA
                                                                                      MD5:4E693AC10DD3FC66700A878B94D3701D
                                                                                      SHA1:692200B78A3EA482577D13BE5588FEB0BF94DF01
                                                                                      SHA-256:3AAC94E73BB4C803BBB4DE14826DAA0AC82BAE5C0841FD7C58B62A5C155C064D
                                                                                      SHA-512:9B68D418B98DDF855C257890376AEC300FC6024E08C85AF5CFFE70BE9AC39D75293C35D841DB8A7BE5574FD185D736F5CB72205531736A202D25305744A2DD15
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Kiev) {. {-9223372036854775808 7324 0 LMT}. {-2840148124 7324 0 KMT}. {-1441159324 7200 0 EET}. {-1247536800 10800 0 MSK}. {-892522800 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-825382800 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {638319600 14400 1 MSD}. {646786800 10800 1 EEST}. {686102400 7200 0 EET}. {701820000 10800 1 EEST}. {717541200 7200 0 EET}. {733269600 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1959
                                                                                      Entropy (8bit):3.5751912319178496
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:c1e/5gjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkw/O2blbEUhtCUH9mUBR:dWDTZVemFLN7NBx333+ix6b0JiG1
                                                                                      MD5:249037A8019D3A5244DD59D8C3316403
                                                                                      SHA1:2DABDE83753CE65D1A2D3949FF9B94401A2DD8C3
                                                                                      SHA-256:5FE8535DD9A4729B68BF5EC178C6F978753A4A01BDC6F5529C2F8A3872B470D1
                                                                                      SHA-512:4180DE17FDDA1417DD24229F775DD45FDE99078E71F2A583E6629D022DCD1B30CEB1ABCEEC78286CAE286E8CBAFC5A7AB20464D53B8BE2615B4681302C05B120
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Kirov) {. {-9223372036854775808 11928 0 LMT}. {-1593820800 10800 0 +03}. {-1247540400 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 18000 1 +05}. {591141600 14400 0 +04}. {606866400 10800 0 +04}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 14400 0 +04}. {701820000 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800 14400 1 +04}. {780447600 10800 0 +03}. {796172400 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9471
                                                                                      Entropy (8bit):3.738653060534981
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:1SgVSz+IZHX68PlXIFj544IrvfMsbxZTH7qwQ:1SYSz+IZHX68PlYFUM8xZTH7qwQ
                                                                                      MD5:AD82B05F966F0EAD5B2F4FD7B6D56718
                                                                                      SHA1:DE5A9BB8B0FCA79C38DD35905FF074503D5AAF13
                                                                                      SHA-256:EE61A08BED392B75FBE67666BDCF7CE26DFA570FC2D1DEC9FFEF51E5D8CD8DF7
                                                                                      SHA-512:68DC078090E2AF1EAF0150BBCF63E52E4675BF22E2FF6BBA4B4D0B244BFF23C73310A3E63365A4217B8466F2C2E7A4384D05D778F70513183B3A59016A55DDB0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Lisbon) {. {-9223372036854775808 -2205 0 LMT}. {-2713908195 -2205 0 LMT}. {-1830384000 0 0 WET}. {-1689555600 3600 1 WEST}. {-1677801600 0 0 WET}. {-1667437200 3600 1 WEST}. {-1647738000 0 0 WET}. {-1635814800 3600 1 WEST}. {-1616202000 0 0 WET}. {-1604365200 3600 1 WEST}. {-1584666000 0 0 WET}. {-1572742800 3600 1 WEST}. {-1553043600 0 0 WET}. {-1541206800 3600 1 WEST}. {-1521507600 0 0 WET}. {-1442451600 3600 1 WEST}. {-1426813200 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364778000 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333328400 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301274000 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269824400 0 0 WET}. {-1221440400 3600 1 WEST}. {-1206925200 0 0 WET}. {-1191200400 3600 1 WEST}. {-1175475600 0 0 WET}. {-1127696400 3600 1 WEST}. {-1111971600 0 0 WET}. {-1096851600 3600 1 WEST}. {-1080522000
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.901869793666386
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQavPSJ5QahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vqm
                                                                                      MD5:5F2AEC41DECD9E26955876080C56B247
                                                                                      SHA1:4FDEC0926933AE5651DE095C519A2C4F9E567691
                                                                                      SHA-256:88146DA16536CCF587907511FB0EDF40E392E6F6A6EFAB38260D3345CF2832E1
                                                                                      SHA-512:B71B6C21071DED75B9B36D49EB5A779C5F74817FF070F70FEAB9E3E719E5F1937867547852052AA7BBAE8B842493FBC7DFAFD3AC47B70D36893541419DDB2D74
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Ljubljana) $TZData(:Europe/Belgrade).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9839
                                                                                      Entropy (8bit):3.737361476589814
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Gj4y1xZfvm8nKrhFs3XRnRaQqTLJaMt/VZ1R6Y+:GjPxZfvmgEhS3XRmau/VZ1R6Y+
                                                                                      MD5:2A53A87C26A5D2AF62ECAAD8CECBF0D7
                                                                                      SHA1:025D31C1D32F1100C1B00858929FD29B4E66E8F6
                                                                                      SHA-256:2A69A7C9A2EE3057EBDB2615DBE5CB08F5D334210449DC3E42EA88564C29583A
                                                                                      SHA-512:81EFA13E4AB30A9363E80EC1F464CC51F8DF3C492771494F3624844E074BA9B84FE50EF6C32F9467E6DAB41BD5159B492B752D0C97F3CB2F4B698C04E68C0255
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/London) {. {-9223372036854775808 -75 0 LMT}. {-3852662325 0 0 GMT}. {-1691964000 3600 1 BST}. {-1680472800 0 0 GMT}. {-1664143200 3600 1 BST}. {-1650146400 0 0 GMT}. {-1633903200 3600 1 BST}. {-1617487200 0 0 GMT}. {-1601848800 3600 1 BST}. {-1586037600 0 0 GMT}. {-1570399200 3600 1 BST}. {-1552168800 0 0 GMT}. {-1538344800 3600 1 BST}. {-1522533600 0 0 GMT}. {-1507500000 3600 1 BST}. {-1490565600 0 0 GMT}. {-1473631200 3600 1 BST}. {-1460930400 0 0 GMT}. {-1442786400 3600 1 BST}. {-1428876000 0 0 GMT}. {-1410732000 3600 1 BST}. {-1396216800 0 0 GMT}. {-1379282400 3600 1 BST}. {-1364767200 0 0 GMT}. {-1348437600 3600 1 BST}. {-1333317600 0 0 GMT}. {-1315778400 3600 1 BST}. {-1301263200 0 0 GMT}. {-1284328800 3600 1 BST}. {-1269813600 0 0 GMT}. {-1253484000 3600 1 BST}. {-1238364000 0 0 GMT}. {-1221429600 3600 1 BST}. {-120
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8826
                                                                                      Entropy (8bit):3.7634145613638657
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:TYt4c9+dcVhv9HMLftvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAr:0w2h1QSTRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:804A17ED0B32B9751C38110D28EB418B
                                                                                      SHA1:24235897E163D33970451C48C4260F6C10C56ADD
                                                                                      SHA-256:00E8152B3E5CD216E4FD8A992250C46E600E2AD773EEDDD87DAD31012BE55693
                                                                                      SHA-512:53AFDDE8D516CED5C6CF0A906DBF72AF09A62278D1FC4D5C1562BBCE853D322457A6346C3DE8F112FCF665102E19A2E677972E941D0C80D0AB7C8DD0B694628E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Luxembourg) {. {-9223372036854775808 1476 0 LMT}. {-2069713476 3600 0 CET}. {-1692496800 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1662343200 7200 1 CEST}. {-1650157200 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1612659600 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585519200 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552258800 0 0 WET}. {-1539997200 3600 1 WEST}. {-1520550000 0 0 WET}. {-1507510800 3600 1 WEST}. {-1490572800 0 0 WET}. {-1473642000 3600 1 WEST}. {-1459119600 0 0 WET}. {-1444006800 3600 1 WEST}. {-1427673600 0 0 WET}. {-1411866000 3600 1 WEST}. {-1396224000 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364774400 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333324800 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301270400 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269813600 0 0 WET}. {-1253484000 3600 1 WEST}. {-
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8225
                                                                                      Entropy (8bit):3.745589534746728
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:kHF0p8d9VPb/aKrwSSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVab:oNHzy8STRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:795CAAE9AECE3900DEA1F5EBD0ED668B
                                                                                      SHA1:61F1745E7B60E19F1286864B7A4285E8CCF11202
                                                                                      SHA-256:4BE326DD950DDAD6FB9C392A31CEED1CB1525D043F1F7C14332FEB226AEA1859
                                                                                      SHA-512:BBBABBE86A757D3EE9267128E7DA810346E74FD9CD3EF37192A831958FF0EDBBE47F14DA63669F6799056081D0365194E22D64D14B97490E4333504DFE22D151
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Madrid) {. {-9223372036854775808 -884 0 LMT}. {-2177452800 0 0 WET}. {-1631926800 3600 1 WEST}. {-1616889600 0 0 WET}. {-1601168400 3600 1 WEST}. {-1585353600 0 0 WET}. {-1442451600 3600 1 WEST}. {-1427673600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364774400 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333324800 0 0 WET}. {-1316390400 3600 1 WEST}. {-1301270400 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269820800 0 0 WET}. {-1026954000 3600 1 WEST}. {-1017619200 0 0 WET}. {-1001898000 3600 1 WEST}. {-999482400 7200 1 WEMT}. {-986090400 3600 1 WEST}. {-954115200 0 0 WET}. {-940208400 3600 0 CET}. {-873079200 7200 1 CEST}. {-862621200 3600 0 CET}. {-842839200 7200 1 CEST}. {-828320400 3600 0 CET}. {-811389600 7200 1 CEST}. {-796870800 3600 0 CET}. {-779940000 7200 1 CEST}. {-765421200 3600 0 CET}. {-748490400 7200 1 CEST}. {-733971600
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8425
                                                                                      Entropy (8bit):3.728789296531475
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:wqZKgpNc6sln3mcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZY:wChslJRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:5F73FCB70E5B27E540C1A5133F3B791C
                                                                                      SHA1:406A2FB6439A3532150D69E711F253665F000B3C
                                                                                      SHA-256:5E3BB07FD3592163A756596A25060683CDA7930C7F4411A406B3E1506F9B901C
                                                                                      SHA-512:5263ABBE91D95BDD359B666BCDDAA6B4C8B810E986B9A94A80AF2B28E48C9C949EC5D5F21158AD306F7AF5BB6A47408C9AA5C5BB6D0053A9B9DA89E76E126FB1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Malta) {. {-9223372036854775808 3484 0 LMT}. {-2403478684 3600 0 CET}. {-1690765200 7200 1 CEST}. {-1680487200 3600 0 CET}. {-1664758800 7200 1 CEST}. {-1648951200 3600 0 CET}. {-1635123600 7200 1 CEST}. {-1616896800 3600 0 CET}. {-1604278800 7200 1 CEST}. {-1585533600 3600 0 CET}. {-1571014800 7200 1 CEST}. {-1555293600 3600 0 CET}. {-932432400 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812588400 7200 1 CEST}. {-798073200 3600 0 CET}. {-781052400 7200 1 CEST}. {-766717200 3600 0 CET}. {-750898800 7200 1 CEST}. {-733359600 3600 0 CET}. {-719456400 7200 1 CEST}. {-701917200 3600 0 CET}. {-689209200 7200 1 CEST}. {-670460400 3600 0 CET}. {-114051600 7200 1 CEST}. {-103168800 3600 0 CET}. {-81997200 7200 1 CEST}. {-71715600 3600 0 CET}. {-50547600 7200 1 CEST}. {-40266000 3600 0 CET}
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.913470013356756
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV1AYKjGyVAIgoq2AYKjvCW6yQausWILMFJ8QarAYKa:SlSWB9IZaM3ymrAdjGyVAIgorAdjoyGK
                                                                                      MD5:CFB0DE2E11B8AF400537BD0EF493C004
                                                                                      SHA1:32E8FCB8571575E9DFE09A966F88C7D3EBCD183E
                                                                                      SHA-256:5F82A28F1FEE42693FD8F3795F8E0D7E8C15BADF1FD9EE4D45794C4C0F36108C
                                                                                      SHA-512:9E36B2EACA06F84D56D9A9A0A83C7C106D26A6A55CBAA696729F105600F5A0105F193899D5996C416EFAABC4649E91BA0ED90D38E8DF7B305C6D951A31C80718
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Helsinki)]} {. LoadTimeZoneFile Europe/Helsinki.}.set TZData(:Europe/Mariehamn) $TZData(:Europe/Helsinki).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2102
                                                                                      Entropy (8bit):3.8519171770148932
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:K6ccjMsJ2JoJrZXnDqVV0Qv3LEevBFoBGrjI9q1F008bBJdO:PRjMAyurZX6V/DYtXE
                                                                                      MD5:E5ECB372FF8F5ED274597551ED2C35F0
                                                                                      SHA1:6792E2676C59F43B9F260AF2F33E4C2484E71D64
                                                                                      SHA-256:78A57D601978869FCAA2737BEC4FDAB72025BC5FDDF7188CCC89034FA767DA6C
                                                                                      SHA-512:261FFB4C7974C5F1C0AECA49D9B26F3BC2998C63CEF9CB168B1060E9EC12F7057DB5376128AFD8A31AF2CC9EF79577E96CD9863AA46AC330A5F057F72E43B7B9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Minsk) {. {-9223372036854775808 6616 0 LMT}. {-2840147416 6600 0 MMT}. {-1441158600 7200 0 EET}. {-1247536800 10800 0 MSK}. {-899780400 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-804646800 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {631141200 10800 0 MSK}. {670374000 7200 0 EEMMTT}. {670377600 10800 1 EEST}. {686102400 7200 0 EET}. {7018272
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8871
                                                                                      Entropy (8bit):3.7700564621466666
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:2LCV8tXttpD72RXbvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHT/:eAYt+STRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:B2BA91B2CDD19E255B68EA35E033C061
                                                                                      SHA1:246E377E815FFC11BBAF898E952194FBEDAE9AA2
                                                                                      SHA-256:768E3D45DB560777C8E13ED9237956CFE8630D840683FAD065A2F6948FD797BE
                                                                                      SHA-512:607383524C478F1CB442679F6DE0964F8916EE1A8B0EF6806BDF7652E4520B0E842A611B432FB190C30C391180EA1867268BBBF6067310F70D5E72CB3E4D789F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Monaco) {. {-9223372036854775808 1772 0 LMT}. {-2486680172 561 0 PMT}. {-1855958961 0 0 WET}. {-1689814800 3600 1 WEST}. {-1680397200 0 0 WET}. {-1665363600 3600 1 WEST}. {-1648342800 0 0 WET}. {-1635123600 3600 1 WEST}. {-1616893200 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585443600 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552266000 0 0 WET}. {-1539997200 3600 1 WEST}. {-1520557200 0 0 WET}. {-1507510800 3600 1 WEST}. {-1490576400 0 0 WET}. {-1470618000 3600 1 WEST}. {-1459126800 0 0 WET}. {-1444006800 3600 1 WEST}. {-1427677200 0 0 WET}. {-1411952400 3600 1 WEST}. {-1396227600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364778000 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333328400 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301274000 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269824400 0 0 WET}. {-1253494800 3600 1 WEST}. {-1238374800 0 0
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2347
                                                                                      Entropy (8bit):3.859849674605335
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cYedmnClAHEFFkebUe9OtUe9h7+UeGH3UeRUeIuUeKqCbUeaJJUevTkUetUeibEV:kmnAA4F7wxJ2JoJrprXn1CL9yLI0vjls
                                                                                      MD5:AB2CB4A38196852883272148B4A14085
                                                                                      SHA1:ED22233A615B775DB528053807858A0B69E9D4FB
                                                                                      SHA-256:D9814005CB99F2275A4356A8B226E16C7C823ADC940F3A7BBB909D4C01BF44E3
                                                                                      SHA-512:F2179FC1C15954FD7F7B824C5310183C96EDC630880E1C8C85DF4423ECC5994B8A9CA826745CC8BCA77945A36BCADAA87620C31FFBD40071438695A610EBF045
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Moscow) {. {-9223372036854775808 9017 0 LMT}. {-2840149817 9017 0 MMT}. {-1688265017 9079 0 MMT}. {-1656819079 12679 1 MST}. {-1641353479 9079 0 MMT}. {-1627965079 16279 1 MDST}. {-1618716679 12679 1 MST}. {-1596429079 16279 1 MDST}. {-1593820800 14400 0 MSD}. {-1589860800 10800 0 MSK}. {-1542427200 14400 1 MSD}. {-1539493200 18000 1 +05}. {-1525323600 14400 1 MSD}. {-1491188400 7200 0 EET}. {-1247536800 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):174
                                                                                      Entropy (8bit):4.73570159193188
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq85GKLWVAIgNwMGKLG6yQatHefeWFKYGKL1:SlSWB9IZaM3yZdLWVAIgGMdL9y3HefeW
                                                                                      MD5:47C275C076A278CA8E1FF24E9E46CC22
                                                                                      SHA1:55992974C353552467C2B57E3955E4DD86BBFAD2
                                                                                      SHA-256:34B61E78EF15EA98C056C1AC8C6F1FA0AE87BD6BC85C58BE8DA44D017B2CA387
                                                                                      SHA-512:1F74FC0B452C0BE35360D1C9EC8347063E8480CA37BE893FD4FF7FC2279B7D0C0909A26763C7755DFB19BE9736340D3FB00D39E9F6BF23C1D2F0015372139847
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Nicosia)]} {. LoadTimeZoneFile Asia/Nicosia.}.set TZData(:Europe/Nicosia) $TZData(:Asia/Nicosia).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7651
                                                                                      Entropy (8bit):3.7309855254369766
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:aG6sT+cQJWxdocRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQt:abcQJWxd/RNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:2A3F771DD9EAE2E9C1D8394C12C0ED71
                                                                                      SHA1:541DCF144EFFE2DFF27B81A50D245C7385CC0871
                                                                                      SHA-256:8DDFB0296622E0BFDBEF4D0C2B4EA2522DE26A16D05340DFECA320C0E7B2B1F7
                                                                                      SHA-512:E1526BD21E379F8B2285481E3E12C1CF775AE43E205D3E7E4A1906B87821D5E15B101B24463A055B6013879CD2777112C7F27B5C5220F280E3C48240367AA663
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Oslo) {. {-9223372036854775808 2580 0 LMT}. {-2366757780 3600 0 CET}. {-1691884800 7200 1 CEST}. {-1680573600 3600 0 CET}. {-927511200 7200 0 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 0 CEST}. {-765327600 3600 0 CET}. {-340844400 7200 1 CEST}. {-324514800 3600 0 CET}. {-308790000 7200 1 CEST}. {-293065200 3600 0 CET}. {-277340400 7200 1 CEST}. {-261615600 3600 0 CET}. {-245890800 7200 1 CEST}. {-230166000 3600 0 CET}. {-214441200 7200 1 CEST}. {-198716400 3600 0 CET}. {-182991600 7200 1 CEST}. {-166662000 3600 0 CET}. {-147913200 7200 1 CEST}. {-135212400 3600 0 CET}. {315529200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {40185
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8838
                                                                                      Entropy (8bit):3.7637328221887567
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:1XV8tXttpD724lvDGwdSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIu:1FYtPSTRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:153CA0EF3813D91C5E23B34ADFE7A318
                                                                                      SHA1:F7F18CB34424A9B62172F00374853F1D4A89BEE4
                                                                                      SHA-256:092BF010A1CF3819B102C2A70340F4D67C87BE2E6A8154716241012B5DFABD88
                                                                                      SHA-512:E2D418D43D9DFD169238DDB0E790714D3B88D16398FA041A9646CB35F24EF79EE48DA4B6201E6A598E89D4C651F8A2FB9FB874B2010A51B3CD35A86767BAF4D2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Paris) {. {-9223372036854775808 561 0 LMT}. {-2486678901 561 0 PMT}. {-1855958901 0 0 WET}. {-1689814800 3600 1 WEST}. {-1680397200 0 0 WET}. {-1665363600 3600 1 WEST}. {-1648342800 0 0 WET}. {-1635123600 3600 1 WEST}. {-1616893200 0 0 WET}. {-1604278800 3600 1 WEST}. {-1585443600 0 0 WET}. {-1574038800 3600 1 WEST}. {-1552266000 0 0 WET}. {-1539997200 3600 1 WEST}. {-1520557200 0 0 WET}. {-1507510800 3600 1 WEST}. {-1490576400 0 0 WET}. {-1470618000 3600 1 WEST}. {-1459126800 0 0 WET}. {-1444006800 3600 1 WEST}. {-1427677200 0 0 WET}. {-1411952400 3600 1 WEST}. {-1396227600 0 0 WET}. {-1379293200 3600 1 WEST}. {-1364778000 0 0 WET}. {-1348448400 3600 1 WEST}. {-1333328400 0 0 WET}. {-1316394000 3600 1 WEST}. {-1301274000 0 0 WET}. {-1284339600 3600 1 WEST}. {-1269824400 0 0 WET}. {-1253494800 3600 1 WEST}. {-1238374800 0 0 W
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.86256001696314
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQazKIGl1/yQahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vq7
                                                                                      MD5:4F430ECF91032E40457F2D2734887860
                                                                                      SHA1:D1C099523C34ED0BD48C24A511377B232548591D
                                                                                      SHA-256:F5AB2E253CA0AB7A9C905B720B19F713469877DE1874D5AF81A8F3E74BA17FC8
                                                                                      SHA-512:2E6E73076A18F1C6C8E89949899F81F232AE66FEB8FFA2A5CE5447FFF581A0D5E0E88DABEAA3C858CC5544C2AE9C6717E590E846CBFD58CEF3B7558F677334FB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Podgorica) $TZData(:Europe/Belgrade).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7763
                                                                                      Entropy (8bit):3.7367850410615597
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:3Nt6F3oxSscRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUE:3/xSTRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:D04290286789AB05490A7DE8569D80AB
                                                                                      SHA1:B65938E29CBFB65D253E041EE1CD92FE75C3C663
                                                                                      SHA-256:60494447C38C67E8173D4A9CDBA8D16AF90545FA83F3558DB8C9B7D0D052DD45
                                                                                      SHA-512:B0897CD4785D737B7C5E5CE717B55AEE8689F83105DDB8A0DA2B4977961124AFA5AF573D57AA4467E5DB68FC5F927D7B58AEE7280238392C5666CC090476EC91
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Prague) {. {-9223372036854775808 3464 0 LMT}. {-3786829064 3464 0 PMT}. {-2469401864 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 1 CEST}. {-777862800 7200 0 CEST}. {-765327600 3600 0 CET}. {-746578800 7200 1 CEST}. {-733359600 3600 0 CET}. {-728517600 0 1 GMT}. {-721260000 0 0 CET}. {-716425200 7200 1 CEST}. {-701910000 3600 0 CET}. {-684975600 7200 1 CEST}. {-670460400 3600 0 CET}. {-654217200 7200 1 CEST}. {-639010800 3600 0 CET}. {283993200 3600 0 CET}. {291776400 7200 1 CEST}. {307501200 3600 0 CET}. {323830800 7200 1 CEST}. {338
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7400
                                                                                      Entropy (8bit):3.686652767751974
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:A46YyurGXl6V/jfaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtk:AnGG160h2kNU4tB715pyzHy1gA
                                                                                      MD5:5F71EBD41FC26CA6FAA0A26CE83FA618
                                                                                      SHA1:0FC66EEB374A2930A7F6E2BB5B7D6C4FD00A258C
                                                                                      SHA-256:6F63E58F355EF6C4CF8F954E01544B0E152605A72B400C731E3100B422A567D0
                                                                                      SHA-512:20B730949A4967C49D259D4D00D8020579580F7FAA0278FBCEBDF8A8173BBF63846DDBF26FFFBBADB0FAF3FD0EB427DBB8CF18A4A80F7B023D2027CC952A773F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Riga) {. {-9223372036854775808 5794 0 LMT}. {-2840146594 5794 0 RMT}. {-1632008194 9394 1 LST}. {-1618702594 5794 0 RMT}. {-1601681794 9394 1 LST}. {-1597275394 5794 0 RMT}. {-1377308194 7200 0 EET}. {-928029600 10800 0 MSK}. {-899521200 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-795834000 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 10800 1 EEST}. {622598
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8511
                                                                                      Entropy (8bit):3.729257183076779
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:YnZKupNc6XTWycRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQt:YVhiRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:3E209874EA8830B8436F897B0B7682B1
                                                                                      SHA1:FC9AB2212C10C25850ACE69DC3BE125FD0912092
                                                                                      SHA-256:626E7F8389382108E323B8447416BAC420A29442D852817024A39A97D556F365
                                                                                      SHA-512:24C1A7890E076C4D58426D62726BC21FA6F70F16B5E9797405B7404AACB1CB2FC283483018418EF0CEE43720838864E01427C60269D98866A48F35CAF0483EFA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Rome) {. {-9223372036854775808 2996 0 LMT}. {-3259097396 2996 0 RMT}. {-2403565200 3600 0 CET}. {-1690765200 7200 1 CEST}. {-1680487200 3600 0 CET}. {-1664758800 7200 1 CEST}. {-1648951200 3600 0 CET}. {-1635123600 7200 1 CEST}. {-1616896800 3600 0 CET}. {-1604278800 7200 1 CEST}. {-1585533600 3600 0 CET}. {-1571014800 7200 1 CEST}. {-1555293600 3600 0 CET}. {-932432400 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-830307600 7200 0 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-807152400 7200 0 CEST}. {-798073200 3600 0 CET}. {-781052400 7200 1 CEST}. {-766717200 3600 0 CET}. {-750898800 7200 1 CEST}. {-733359600 3600 0 CET}. {-719456400 7200 1 CEST}. {-701917200 3600 0 CET}. {-689209200 7200 1 CEST}. {-670460400 3600 0 CET}. {-114051600 7200 1 CEST}. {-103168800 3600 0 CET}. {-81997200 7200 1 C
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2045
                                                                                      Entropy (8bit):3.5710319343050183
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cBesqgOjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkw/O2blbEUhtCUHiWnb:rdDTZVemFLN7NBx3BngyxJvqJ2FJ/jz
                                                                                      MD5:30271DF851CE290256FA0BE793F3A918
                                                                                      SHA1:307BF37BD5110537B023A648AAC41F86E3D34ACB
                                                                                      SHA-256:11400A62327FB9DEFB2D16EBD8E759F94C37EF4F12C49AC97DA2E5031FFA0079
                                                                                      SHA-512:3E86BDF258BA23AFF9E1BDCDFE7853D5413A589160F67AF7424CE014B7A77A948B8BF973EB02A0FFFE47D5D0EA4464D851DF294C04AF685C0AF7A0EB08DD9067
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Samara) {. {-9223372036854775808 12020 0 LMT}. {-1593820800 10800 0 +03}. {-1247540400 14400 0 +04}. {-1102305600 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 18000 1 +05}. {591141600 14400 0 +04}. {606866400 10800 0 +04}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 7200 0 +03}. {670377600 10800 1 +03}. {686102400 10800 0 +03}. {687916800 14400 0 +04}. {701820000 18000 1 +05}. {717544800 14400 0 +04}. {733269600 18000 1 +05}. {748994400
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):174
                                                                                      Entropy (8bit):4.908962717024613
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVvjFwFVAIgoqsuCHRLyQawELDX7x/yQax9:SlSWB9IZaM3ymx5wFVAIgoxuCxLyt/yR
                                                                                      MD5:C50388AD7194924572FA470761DD09C7
                                                                                      SHA1:EF0A2223B06BE12EFE55EE72BF2C941B7BFB2FFE
                                                                                      SHA-256:7F89757BAE3C7AE59200DCEEEE5C38A7F74EBAA4AA949F54AFD5E9BB64B13123
                                                                                      SHA-512:0CE5FF2F839CD64A2C9A5AE6BBE122C91342AE44BDECDB9A3BA9F08578BC0B474BC0AF0E773868B273423289254909A38902B225A0092D048AC44BCF883AB4B0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Rome)]} {. LoadTimeZoneFile Europe/Rome.}.set TZData(:Europe/San_Marino) $TZData(:Europe/Rome).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.890934294125181
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQawEX3GEaQahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vqa
                                                                                      MD5:5C12CEEDB17515260E2E143FB8F867F5
                                                                                      SHA1:51B9CDF922BFBA52BF2618B63435EC510DEAE423
                                                                                      SHA-256:7C45DFD5F016982F01589FD2D1BAF97898D5716951A4E08C3540A76E8D56CEB1
                                                                                      SHA-512:7A6B7FDFD6E5CFEB2D1AC136922304B0A65362E19307E0F1E20DBF48BED95A262FAC9CBCDB015C3C744D57118A85BD47A57636A05144430BF6707404F8E53E8C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Sarajevo) $TZData(:Europe/Belgrade).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1990
                                                                                      Entropy (8bit):3.5705804674707893
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cWe35gjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkwLUk+EUhtCUH9mUBU9R:qWDTZVemFLN70333+ix6b0JiGk
                                                                                      MD5:EEA55E1788265CCC7B3BDB775AF3DD38
                                                                                      SHA1:E327A5965114AB8BF6E479989E43786F0B74CFB1
                                                                                      SHA-256:0031D4DEC64866DEB1B5E566BB957F2C0E46E5751B31DF9C8A3DA1912AEC4CB2
                                                                                      SHA-512:21EF7D364814259F23319D4BC0E4F7F0653D35C1DD03D22ACD8E9A540EE8A9E651BEE22501E4150F6C74901AC2ED750CE08AAE0551DF5A44AB11FD4A3DB49D59
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Saratov) {. {-9223372036854775808 11058 0 LMT}. {-1593820800 10800 0 +03}. {-1247540400 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 10800 0 +04}. {575420400 14400 1 +04}. {591145200 10800 0 +03}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 14400 0 +04}. {701820000 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800 14400 1 +04}. {780447600 10800 0 +03}. {796172400
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2307
                                                                                      Entropy (8bit):3.8673720237532523
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:wMxjIJJ2JoJrsyCmh7VloiIa0QM0ScfSblniT+CC:jjInyur/hUaKln
                                                                                      MD5:F745F2F2FDEA14C70EA27BA35D4E3051
                                                                                      SHA1:C4F01A629E6BAFB31F722FA65DC92B36D4E61E43
                                                                                      SHA-256:EAE97716107B2BF4A14A08DD6197E0542B6EE27C3E12C726FC5BAEF16A144165
                                                                                      SHA-512:0E32BE79C2576943D3CB684C2E25EE3970BE7F490FF8FD41BD897249EA560F280933B26B3FBB841C67915A3427CB009A1BFC3DACD70C4F77E33664104E32033E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Simferopol) {. {-9223372036854775808 8184 0 LMT}. {-2840148984 8160 0 SMT}. {-1441160160 7200 0 EET}. {-1247536800 10800 0 MSK}. {-888894000 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-811645200 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {631141200 10800 0 MSK}. {646786800 7200 0 EET}. {694216800 7200 0 EET}. {701820000 10800 1 EEST}. {71754
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):182
                                                                                      Entropy (8bit):4.906520812033373
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQawOgpr8QahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vq3
                                                                                      MD5:BB062D4D5D6EA9BA172AC0555227A09C
                                                                                      SHA1:75CCA7F75CEB77BE5AFB02943917DB048051F396
                                                                                      SHA-256:51820E2C5938CEF89A6ED2114020BD32226EF92102645526352E1CB7995B7D0A
                                                                                      SHA-512:8C6AD79DD225C566D2D93606575A1BF8DECF091EDFEED1F10CB41C5464A6A9F1C15BEB4957D76BD1E03F5AE430319480A3FDACEF3116EA2AF0464427468BC855
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Skopje) $TZData(:Europe/Belgrade).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7396
                                                                                      Entropy (8bit):3.6373782291014924
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:8lAV/6vcBrYixX21/BVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykePG:8lAV/SEm1/mh2kNU4tB715pyzHy1gA
                                                                                      MD5:8B538BB68A7FF0EB541EB2716264BAD9
                                                                                      SHA1:49899F763786D4E7324CC5BAAECFEA87D5C4F6C7
                                                                                      SHA-256:9D60EF4DBA6D3802CDD25DC87E00413EC7F37777868C832A9E4963E8BCDB103C
                                                                                      SHA-512:AD8D75EE4A484050BB108577AE16E609358A9E4F31EA1649169B4A26C8348A502B4135FE3A282A2454799250C6EDF9E70B236BCF23E1F6540E123E39E81BBE41
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Sofia) {. {-9223372036854775808 5596 0 LMT}. {-2840146396 7016 0 IMT}. {-2369527016 7200 0 EET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-788922000 3600 0 CET}. {-781048800 7200 0 EET}. {291762000 10800 0 EEST}. {307576800 7200 0 EET}. {323816400 10800 1 EEST}. {339026400 7200 0 EET}. {355266000 10800 1 EEST}. {370393200 7200 0 EET}. {386715600 10800 1 EEST}. {401846400 7200 0 EET}. {417571200 10800 1 EEST}. {433296000 7200 0 EET}. {449020800 10800 1 EEST}. {465350400 7200 0 EET}. {481075200 10800 1 EEST}. {496800000 7200 0 EET}. {512524800 10800 1 EEST}. {528249600 7200 0 EET}. {543974400 10800 1 EEST}. {559699200 7200 0 EET}. {575424000 10800 1 EEST}. {591148800 7200 0 EET}. {606873600 10800 1 EEST}. {622598400 7200 0 EET}. {638323200 10
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7058
                                                                                      Entropy (8bit):3.730067397634837
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:K39ucRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyzF76:K3HRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:7F6C45358FC5E91125ACBDD46BBD93FE
                                                                                      SHA1:C07A80D3C136679751D64866B725CC390D73B750
                                                                                      SHA-256:119E9F7B1284462EB8E920E7216D1C219B09A73B323796BBF843346ECD71309A
                                                                                      SHA-512:585AE0B1DE1F5D31E45972169C831D837C19D05E21F65FAD3CB84BEF8270C31BF2F635FB803CB70C569FAC2C8AA6ABDE057943F4B51BF1D73B72695FE95ECFD2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Stockholm) {. {-9223372036854775808 4332 0 LMT}. {-2871681132 3614 0 SET}. {-2208992414 3600 0 CET}. {-1692496800 7200 1 CEST}. {-1680483600 3600 0 CET}. {315529200 3600 0 CET}. {323830800 7200 1 CEST}. {338950800 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {401850000 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}. {622602000 3600 0 CET}. {638326800 7200 1 CEST}. {654656400 3600 0 CET}. {670381200 7200 1 CEST}. {686106000 3600 0 CET}. {701830800 7200 1 CEST}. {717555600 3600 0 CET}. {733280400 7200 1 CEST
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7295
                                                                                      Entropy (8bit):3.6772204206246193
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:dcqDyurGXl6V/DraKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtk:e7GG16gh2kNU4tB715pyzHy1gA
                                                                                      MD5:981078CAEAA994DD0C088B8C4255018A
                                                                                      SHA1:5B5E542491FCCC80B04F6F3CA3BA76FEE35BC207
                                                                                      SHA-256:716CFFE58847E0084C904A01EF4230F63275660691A4BA54D0B80654E215CC8F
                                                                                      SHA-512:3010639D28C7363D0B787F84EF57EE30F457BD8A6A64AEDED1E813EB1AF0A8D85DA0A788C810509F932867F7361B338753CC9B79ACA95D2D32A77F7A8AA8BC9F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Tallinn) {. {-9223372036854775808 5940 0 LMT}. {-2840146740 5940 0 TMT}. {-1638322740 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1593824400 5940 0 TMT}. {-1535938740 7200 0 EET}. {-927943200 10800 0 MSK}. {-892954800 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-797648400 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 10800 1 EEST}. {622598400 7200 0 EET}. {638
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7412
                                                                                      Entropy (8bit):3.7216700074911437
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:6t1WXXRM8DAdRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQlth:6GXh9AdRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:872AB00046280F53657A47D41FBA5EFE
                                                                                      SHA1:311BF2342808BD9DC8AB2C2856A1F91F50CFB740
                                                                                      SHA-256:D02C2CD894AE4D3C2619A4249088A566B02517FA3BF65DEFAF4280C407E5B5B3
                                                                                      SHA-512:2FF901990FA8D6713D875F90FE611E54B35A2216C380E88D408C4FB5BD06916EE804DC6331C117C3AC643731BEADB5BDEDEA0F963B89FAEDB07CA3FFD0B3A535
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Tirane) {. {-9223372036854775808 4760 0 LMT}. {-1767230360 3600 0 CET}. {-932346000 7200 0 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-843519600 3600 0 CET}. {136854000 7200 1 CEST}. {149896800 3600 0 CET}. {168130800 7200 1 CEST}. {181432800 3600 0 CET}. {199839600 7200 1 CEST}. {213141600 3600 0 CET}. {231894000 7200 1 CEST}. {244591200 3600 0 CET}. {263257200 7200 1 CEST}. {276040800 3600 0 CET}. {294706800 7200 1 CEST}. {307490400 3600 0 CET}. {326156400 7200 1 CEST}. {339458400 3600 0 CET}. {357087600 7200 1 CEST}. {370389600 3600 0 CET}. {389142000 7200 1 CEST}. {402444000 3600 0 CET}. {419468400 7200 1 CEST}. {433807200 3600 0 CET}. {449622000 7200 1 CEST}. {457480800 7200 0 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.85845283098493
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV+NM/LpVAIgoq9NM/eO6yQa3MPgJM1p8QagNM/cn:SlSWB9IZaM3ymI6NVAIgoI6eFytM4M8g
                                                                                      MD5:743453106E8CD7AE48A2F575255AF700
                                                                                      SHA1:7CD6F6DCA61792B4B2CBF6645967B9349ECEACBE
                                                                                      SHA-256:C28078D4B42223871B7E1EB42EEB4E70EA0FED638288E9FDA5BB5F954D403AFB
                                                                                      SHA-512:458072C7660BEAFEB9AE5A2D3AEA6DA582574D80193C89F08A57B17033126E28A175F5B6E2990034660CAE3BC1E837F8312BC4AA365F426BD54588D0C5A12EB8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Chisinau)]} {. LoadTimeZoneFile Europe/Chisinau.}.set TZData(:Europe/Tiraspol) $TZData(:Europe/Chisinau).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2046
                                                                                      Entropy (8bit):3.588329521363201
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cUeRgjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkw/O2blbEUhtCUHiWn0it:EWDTZVemFLN7NBx3Bnu3+ix6b0JiGef
                                                                                      MD5:E4394950F7838CD984172D68DA413486
                                                                                      SHA1:75F84A4C887463DE3F82C7F0339DD7D71871AA65
                                                                                      SHA-256:CB780BBC06F9268CE126461AF9B6539FF16964767A8763479099982214280896
                                                                                      SHA-512:7D0E3904300FDD3C4814E15A3C042F3E641BF56AF6867DA7580D1DAD8E07F5B4F0C0717A34E8336C0908D760EDCD48605C7B6BA06A5165BD2BD3AF0B68399C59
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Ulyanovsk) {. {-9223372036854775808 11616 0 LMT}. {-1593820800 10800 0 +03}. {-1247540400 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 18000 1 +05}. {591141600 14400 0 +04}. {606866400 10800 0 +04}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 7200 0 +03}. {670377600 10800 1 +03}. {686102400 7200 0 +02}. {695779200 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7287
                                                                                      Entropy (8bit):3.681086026612126
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:DptgbYyurZiVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEZ2:Dp4GZNh2kNU4tB715pyzHy1gA
                                                                                      MD5:E1088083B0D5570AF8FBE54A4C553AFB
                                                                                      SHA1:A6EC8636A0092737829B873C4879E9D4C1B0A288
                                                                                      SHA-256:19D87DB3DAB942037935FEC0A9A5E5FE24AFEB1E5F0F1922AF2AF2C2E186621D
                                                                                      SHA-512:C58AA37111AE29F85C9C3F1E52DB3C9B2E2DCEFBBB9ACA4C61AD9B00AA7F3A436E754D2285774E882614B16D5DB497ED370A06EE1AFC513579E1E5F1475CA160
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Uzhgorod) {. {-9223372036854775808 5352 0 LMT}. {-2500939752 3600 0 CET}. {-946774800 3600 0 CET}. {-938905200 7200 1 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796870800 7200 1 CEST}. {-794714400 3600 0 CET}. {-773456400 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {631141200 10800 0 MSK}. {646786800 3600 0 CET}. {670384800 7200 0 EET}. {694216800
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):175
                                                                                      Entropy (8bit):4.906311228352029
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVnCMPwVAIgoqkCMJW6yQa1NEHp8Qa5CMP:SlSWB9IZaM3ym5XwVAIgo5PyvNEJ8jH
                                                                                      MD5:C1817BA53C7CD6BF007A7D1E17FBDFF1
                                                                                      SHA1:C72DCD724E24BBE7C22F9279B05EE03924603348
                                                                                      SHA-256:E000C8E2A27AE8494DC462D486DC28DAFA502F644FC1540B7B6050EABE4712DC
                                                                                      SHA-512:E48C1E1E60233CEC648004B6441F4A49D18D07904F88670A6F9A3DACC3006F7D7CE4A9ACB6C9B6DB8F45CB324EA1BCF6CC3DA8C1FFB40A948BB2231AC4B57EEB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Zurich)]} {. LoadTimeZoneFile Europe/Zurich.}.set TZData(:Europe/Vaduz) $TZData(:Europe/Zurich).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):171
                                                                                      Entropy (8bit):4.8663121336740405
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVvjFwFVAIgoqsuCHRLyQa1xLM1p8Qax9:SlSWB9IZaM3ymx5wFVAIgoxuCxLyvN+a
                                                                                      MD5:0652C9CF19CCF5C8210330B22F200D47
                                                                                      SHA1:052121E14825CDF98422CAA2CDD20184F184A446
                                                                                      SHA-256:3BC0656B5B52E3C3C6B7BC5A53F9228AAFA3EB867982CFD9332B7988687D310B
                                                                                      SHA-512:1880524DCA926F4BFD1972E53D5FE616DE18E4A29E9796ABEAEE4D7CD10C6FE79C0D731B305BD4DAA6FC3917B286543D622F2291B76DABA231B9B22A784C7475
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Rome)]} {. LoadTimeZoneFile Europe/Rome.}.set TZData(:Europe/Vatican) $TZData(:Europe/Rome).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7659
                                                                                      Entropy (8bit):3.7322931990772257
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:2ntWj6DmcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAT:2tWURNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:E8D0D78179D1E9D738CEEC1D0D4943E5
                                                                                      SHA1:E0469B86F545FFFA81CE9694C96FE30F33F745DD
                                                                                      SHA-256:44FF42A100EA0EB448C3C00C375F1A53614B0B5D468ADF46F2E5EAFF44F7A64C
                                                                                      SHA-512:FACA076F44A64211400910E4A7CAD475DD24745ECCE2FE608DD47B0D5BB9221FF15B9D58A767A90FF8D25E0545C3E50B3E464FF80B1D23E934489420640F5C8A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Vienna) {. {-9223372036854775808 3921 0 LMT}. {-2422055121 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618700400 3600 0 CET}. {-1577926800 3600 0 CET}. {-1569711600 7200 1 CEST}. {-1555801200 3600 0 CET}. {-938905200 7200 0 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796777200 3600 0 CET}. {-781052400 7200 1 CEST}. {-780188400 3600 0 CET}. {-757386000 3600 0 CET}. {-748479600 7200 1 CEST}. {-733359600 3600 0 CET}. {-717634800 7200 1 CEST}. {-701910000 3600 0 CET}. {-684975600 7200 1 CEST}. {-670460400 3600 0 CET}. {323823600 7200 1 CEST}. {338940000 3600 0 CET}. {347151600 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7233
                                                                                      Entropy (8bit):3.682695131194103
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:/FsyurvxXl6V/DAOLl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtk:/fGJ16Oh2kNU4tB715pyzHy1gA
                                                                                      MD5:CF7967CD882413C1423CCD5A1EDC8B2E
                                                                                      SHA1:72F5F5D280530A67591FC0F88BF272E2975E173C
                                                                                      SHA-256:1E13055C7BF8D7469AFC28B0ED91171D203B382B62F78D140C1CB12CF968637C
                                                                                      SHA-512:777B7418FFB8DFE4E6A2B1057BB3CFF2358269044F0E5887260663790D0344BDFD8BF5C220987E30B2D8D391BB96C17C8C5EE86DA83EC4874F7EC3172477DFB6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Vilnius) {. {-9223372036854775808 6076 0 LMT}. {-2840146876 5040 0 WMT}. {-1672536240 5736 0 KMT}. {-1585100136 3600 0 CET}. {-1561251600 7200 0 EET}. {-1553565600 3600 0 CET}. {-928198800 10800 0 MSK}. {-900126000 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-802141200 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 7200 0 EEMMTT}. {606873600 10800 1 EEST}. {622598400 7200 0 EET}. {638
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2021
                                                                                      Entropy (8bit):3.5806689351967527
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:cRecrebjS+OVkb/cXODnOwUDOS5u8OimFeb/ROHc9qOYNkwLUk+EUhtCUH9mUBUv:YenDTZVemFLN70333+ix6b0JiGE
                                                                                      MD5:DFC3D37284F1DCFE802539DB1E684399
                                                                                      SHA1:67778FFE4326B1391C3CFE991B3C84C1E9ACA2D2
                                                                                      SHA-256:AAFA26F7ED5733A2E45E77D67D7E4E521918CBDC19DAB5BA7774C60B9FDC203F
                                                                                      SHA-512:B5A63E363CF9814C6E530840D9BB5A78C36493BAD54060781BACDF10DFA8C95988081DE3364E56D3FDFDBB5A6489E549D8CB1C0B5D1C57F53A1B1915B291A0D9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Volgograd) {. {-9223372036854775808 10660 0 LMT}. {-1577761060 10800 0 +03}. {-1247540400 14400 0 +04}. {-256881600 14400 0 +05}. {354916800 18000 1 +05}. {370724400 14400 0 +04}. {386452800 18000 1 +05}. {402260400 14400 0 +04}. {417988800 18000 1 +05}. {433796400 14400 0 +04}. {449611200 18000 1 +05}. {465343200 14400 0 +04}. {481068000 18000 1 +05}. {496792800 14400 0 +04}. {512517600 18000 1 +05}. {528242400 14400 0 +04}. {543967200 18000 1 +05}. {559692000 14400 0 +04}. {575416800 10800 0 +04}. {575420400 14400 1 +04}. {591145200 10800 0 +03}. {606870000 14400 1 +04}. {622594800 10800 0 +03}. {638319600 14400 1 +04}. {654649200 10800 0 +03}. {670374000 14400 0 +04}. {701820000 10800 0 +04}. {701823600 14400 1 +04}. {717548400 10800 0 +03}. {733273200 14400 1 +04}. {748998000 10800 0 +03}. {764722800 14400 1 +04}. {780447
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8366
                                                                                      Entropy (8bit):3.731361496484662
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:uOZMLerhW4v4Qzh3VEbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0c:uArhW4v4yENH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:5F72F26A78BECD6702560DE8C7CCB850
                                                                                      SHA1:A14E10DCC128B88B3E9C5D2A86DAC7D254CEB123
                                                                                      SHA-256:054C1CDABAD91C624A4007D7594C30BE96906D5F29B54C292E0B721F8CB03830
                                                                                      SHA-512:564A575EA2FBDB1D262CF55D55BEFC0BF6EF2081D88DE25712B742F5800D2FBE155EDEF0303F62D497BA0E849174F235D8599E09E1C997789E24FE5583F4B0FC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Warsaw) {. {-9223372036854775808 5040 0 LMT}. {-2840145840 5040 0 WMT}. {-1717032240 3600 0 CET}. {-1693706400 7200 1 CEST}. {-1680483600 3600 0 CET}. {-1663455600 7200 1 CEST}. {-1650150000 3600 0 CET}. {-1632006000 7200 1 CEST}. {-1618696800 7200 0 EET}. {-1600473600 10800 1 EEST}. {-1587168000 7200 0 EET}. {-931734000 7200 0 CEST}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-812502000 7200 1 CEST}. {-796870800 7200 0 CEST}. {-796608000 3600 0 CET}. {-778726800 7200 1 CEST}. {-762660000 3600 0 CET}. {-748486800 7200 1 CEST}. {-733273200 3600 0 CET}. {-715215600 7200 1 CEST}. {-701910000 3600 0 CET}. {-684975600 7200 1 CEST}. {-670460400 3600 0 CET}. {-654130800 7200 1 CEST}. {-639010800 3600 0 CET}. {-397094400 7200 1 CEST}. {-386812800 3600 0 CET}. {-371088000 7200 1 CEST}. {-355363200 3600 0
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):182
                                                                                      Entropy (8bit):4.851218990240677
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV/sUE2tvFVAIgoq8sUE2vqLyQa5rXv1/h8QahsUE2u:SlSWB9IZaM3ymhrE2tvFVAIgohrE2vqK
                                                                                      MD5:445F589A26E47F9D7BDF1A403A96108E
                                                                                      SHA1:B119D93796DA7C793F9ED8C5BB8BB65C8DDBFC81
                                                                                      SHA-256:6E3ED84BC34D90950D267230661C2EC3C32BA190BD57DDC255F4BE901678B208
                                                                                      SHA-512:F45AF9AC0AF800FDCC74DBED1BDFA106A6A58A15308B5B62B4CB6B091FCFD321F156618BE2C157A1A6CAFAAAC399E4C6B590AF7CE7176F757403B55F09842FD2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Belgrade)]} {. LoadTimeZoneFile Europe/Belgrade.}.set TZData(:Europe/Zagreb) $TZData(:Europe/Belgrade).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7238
                                                                                      Entropy (8bit):3.6787190163584103
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:Tnh2yurpr2nVaKl9sUM2kNU4tztagAwkY5V778e27zo2yiQ6kjmyykeP2lwtOEZ2:T1Gt2ch2kNU4tB715pyzHy1gA
                                                                                      MD5:4AC1F6AB26F3869C757247346BCB72B5
                                                                                      SHA1:CB0880906DC630F3C2B934998853CD05AAA1FE39
                                                                                      SHA-256:3E9F843F5C6DDBE8E6431BE28ACB95507DDDCA6C521E2FD3355A103BF38F3CB7
                                                                                      SHA-512:C4A3AB7B5BA3BC371285654159CB1767ECD52DEDAA61BF69586F6ED61F9F1E877796C28438FF582962C12780484214B5EA670654C87240E01EDD2A4B271EDEEF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Zaporozhye) {. {-9223372036854775808 8440 0 LMT}. {-2840149240 8400 0 +0220}. {-1441160400 7200 0 EET}. {-1247536800 10800 0 MSK}. {-894769200 3600 0 CET}. {-857257200 3600 0 CET}. {-844556400 7200 1 CEST}. {-828226800 3600 0 CET}. {-826419600 10800 0 MSD}. {354920400 14400 1 MSD}. {370728000 10800 0 MSK}. {386456400 14400 1 MSD}. {402264000 10800 0 MSK}. {417992400 14400 1 MSD}. {433800000 10800 0 MSK}. {449614800 14400 1 MSD}. {465346800 10800 0 MSK}. {481071600 14400 1 MSD}. {496796400 10800 0 MSK}. {512521200 14400 1 MSD}. {528246000 10800 0 MSK}. {543970800 14400 1 MSD}. {559695600 10800 0 MSK}. {575420400 14400 1 MSD}. {591145200 10800 0 MSK}. {606870000 14400 1 MSD}. {622594800 10800 0 MSK}. {638319600 14400 1 MSD}. {654649200 10800 0 MSK}. {670374000 10800 0 EEST}. {686091600 7200 0 EET}. {701820000 10800 1 EEST}. {71
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7055
                                                                                      Entropy (8bit):3.732572949993817
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:k7tmcRbjOP9/V+H4Mnb4Nkrloy4xBqffZRgKs0AzxAHTdIVaAq0VZQltUbAyzF76:kbRNH4Mn82rlo6XIZ9ALeBO
                                                                                      MD5:D9A3FAE7D9B5C9681D7A98BFACB6F57A
                                                                                      SHA1:11268DFEE6D2472B3D8615ED6D70B361521854A2
                                                                                      SHA-256:C920B4B7C160D8CEB8A08E33E5727B14ECD347509CABB1D6CDC344843ACF009A
                                                                                      SHA-512:7709778B82155FBF35151F9D436F3174C057EBF7927C48F841B1D8AF008EEA9BC181D862A57C436EC69A528FB8B9854D9E974FC9EEC4FFDFE983299102BCDFB1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Europe/Zurich) {. {-9223372036854775808 2048 0 LMT}. {-3675198848 1786 0 BMT}. {-2385246586 3600 0 CET}. {-904435200 7200 1 CEST}. {-891129600 3600 0 CET}. {-872985600 7200 1 CEST}. {-859680000 3600 0 CET}. {347151600 3600 0 CET}. {354675600 7200 1 CEST}. {370400400 3600 0 CET}. {386125200 7200 1 CEST}. {401850000 3600 0 CET}. {417574800 7200 1 CEST}. {433299600 3600 0 CET}. {449024400 7200 1 CEST}. {465354000 3600 0 CET}. {481078800 7200 1 CEST}. {496803600 3600 0 CET}. {512528400 7200 1 CEST}. {528253200 3600 0 CET}. {543978000 7200 1 CEST}. {559702800 3600 0 CET}. {575427600 7200 1 CEST}. {591152400 3600 0 CET}. {606877200 7200 1 CEST}. {622602000 3600 0 CET}. {638326800 7200 1 CEST}. {654656400 3600 0 CET}. {670381200 7200 1 CEST}. {686106000 3600 0 CET}. {701830800 7200 1 CEST}. {717555600 3600 0 CET}. {733280400 7200 1 CEST}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):165
                                                                                      Entropy (8bit):4.848987525932415
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6wox6QavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUwR1O
                                                                                      MD5:2639233BCD0119FD601F55F2B6279443
                                                                                      SHA1:AADF9931DF78F5BC16ED4638947E77AE52E80CA1
                                                                                      SHA-256:846E203E4B40EA7DC1CB8633BF950A8173D7AA8073C186588CC086BC7C4A2BEE
                                                                                      SHA-512:8F571F2BBE4C60E240C4EBBB81D410786D1CB8AD0761A99ABB61DDB0811ACC92DCC2F765A7962B5C560B86732286356357D3F408CAC32AC1B2C1F8EAD4AEAEA6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:GB) $TZData(:Europe/London).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):170
                                                                                      Entropy (8bit):4.860435123210029
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxKL82wFVAIgoqyKL8p6w4b/h8QavKL8i:SlSWB9IZaM3ymvKA2wFVAIgovKAUw4bx
                                                                                      MD5:51335479044A047F5597F0F06975B839
                                                                                      SHA1:234CD9635E61E7D429C70E886FF9C9F707FEAF1F
                                                                                      SHA-256:FAC3B11B1F4DA9D68CCC193526C4E369E3FAA74F95C8BEE8BB9FAE014ACD5900
                                                                                      SHA-512:4E37EFDFBAFA5C517BE86195373D083FF4370C5031B35A735E3225E7B17A75899FAFFBDF0C8BCFCBC5DC2D037EE9465AD3ED7C0FA55992027DFD69618DC9918F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/London)]} {. LoadTimeZoneFile Europe/London.}.set TZData(:GB-Eire) $TZData(:Europe/London).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):148
                                                                                      Entropy (8bit):4.817383285510599
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtwZ8RDMvn:SlSWB9IZaM3yF4FVAIgJtwZ8RQvn
                                                                                      MD5:D19DC8277A68AA289A361D28A619E0B0
                                                                                      SHA1:27F5F30CC2603E1BCB6270AF84E9512DADEEB055
                                                                                      SHA-256:5B90891127A65F7F3C94B44AA0204BD3F488F21326E098B197FB357C51845B66
                                                                                      SHA-512:B5DD9C2D55BDB5909A29FD386CF107B83F56CD9B9F979A5D3854B4112B7F8950F4E91FB86AF6556DCF583EE469470810F3F8FB6CCF04FDBD6625A4346D3CD728
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:GMT) $TZData(:Etc/GMT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):150
                                                                                      Entropy (8bit):4.868642878112439
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtwe7/8RDMvn:SlSWB9IZaM3yF4FVAIgJtwI8RQvn
                                                                                      MD5:B5065CD8B1CB665DACDB501797AF5104
                                                                                      SHA1:0DB4E9AC6E38632302D9689A0A39632C2592F5C7
                                                                                      SHA-256:6FC1D3C727CD9386A11CAF4983A2FC06A22812FDC7752FBFA7A5252F92BB0E70
                                                                                      SHA-512:BBA1793CA3BBC768EC441210748098140AE820910036352F5784DD8B2DABA8303BA2E266CB923B500E8F90494D426E8BF115ACD0C000CD0C65896CE7A6AD9D66
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:GMT+0) $TZData(:Etc/GMT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):150
                                                                                      Entropy (8bit):4.8553095447791055
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtw4Hp8RDMvn:SlSWB9IZaM3yF4FVAIgJtw4J8RQvn
                                                                                      MD5:E71CDE5E33573E78E01F4B7AB19F5728
                                                                                      SHA1:C296752C449ED90AE20F5AEC3DC1D8F329C2274F
                                                                                      SHA-256:78C5044C723D21375A1154AE301F29D13698C82B3702042C8B8D1EFF20954078
                                                                                      SHA-512:6EBB39EF85DA70833F8B6CCD269346DC015743BC049F6F1B385625C5498F4E953A0CEDE76C60314EE671FE0F6EEB56392D62E0128F5B04BC68681F71718FE2BB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:GMT-0) $TZData(:Etc/GMT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):149
                                                                                      Entropy (8bit):4.843152601955343
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtwPHp8RDMvn:SlSWB9IZaM3yF4FVAIgJtwvp8RQvn
                                                                                      MD5:FE666CDF1E9AA110A7A0AE699A708927
                                                                                      SHA1:0E7FCDA9B47BC1D5F4E0DFAD8A9E7B73D71DC9E3
                                                                                      SHA-256:0A883AFE54FAE0ED7D6535BDAB8A767488A491E6F6D3B7813CF76BB32FED4382
                                                                                      SHA-512:763591A47057D67E47906AD22270D589100A7380B6F9EAA9AFD9D6D1EE254BCB1471FEC43531C4196765B15F2E27AF9AAB5A688D1C88B45FE7EEA67B6371466E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:GMT0) $TZData(:Etc/GMT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):154
                                                                                      Entropy (8bit):4.869510201987464
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqSsM4DvFVAIgexvqtwE+FB5yRDMvn:SlSWB9IZaM3yF4FVAIgJtwE6BURQvn
                                                                                      MD5:F989F3DB0290B2126DA85D78B74E2061
                                                                                      SHA1:43A0A1737E1E3EF0501BB65C1E96CE4D0B5635FC
                                                                                      SHA-256:41A45FCB805DB6054CD1A4C7A5CFBF82668B3B1D0E44A6F54DFB819E4C71F68A
                                                                                      SHA-512:3EDB8D901E04798B566E6D7D72841C842803AE761BEF3DEF37B8CA481E79915A803F61360FA2F317D7BDCD913AF8F5BB14F404E80CFA4A34E4310055C1DF39F2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/GMT)]} {. LoadTimeZoneFile Etc/GMT.}.set TZData(:Greenwich) $TZData(:Etc/GMT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):106
                                                                                      Entropy (8bit):4.860812879108152
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5/Lm/kXGm2OH1V9i:SlSWB9X5jmTm2OH1V8
                                                                                      MD5:3D99F2C6DADF5EEEA4965A04EB17B1BB
                                                                                      SHA1:8DF607A911ADF6A9DD67D786FC9198262F580312
                                                                                      SHA-256:2C83D64139BFB1115DA3F891C26DD53B86436771A30FB4DD7C8164B1C0D5BCDE
                                                                                      SHA-512:EDA863F3A85268BA7A8606E3DCB4D7C88B0681AD8C4CFA1249A22B184F83BFDE9855DD4E5CFC3A4692220E5BEFBF99ED10E13BD98DBCA37D6F29A10AB660EBE2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:HST) {. {-9223372036854775808 -36000 0 HST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):174
                                                                                      Entropy (8bit):4.865313867650324
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8LizFVAIgN2qPJL/XF1p4WFKQ1n:SlSWB9IZaM3yWzFVAIgAML//p4wKi
                                                                                      MD5:D828C0668A439FEB9779589A646793F8
                                                                                      SHA1:1509415B72E2155725FB09615B3E0276F3A46E87
                                                                                      SHA-256:CF8BFEC73D36026955FA6F020F42B6360A64ED870A88C575A5AA0CD9756EF51B
                                                                                      SHA-512:0F864B284E48B993DD13296AF05AEB14EBE26AF32832058C1FC32FCCE78E85925A25D980052834035D37935FAAF1CB0A9579AECBE6ADCDB2791A134D88204EBF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Hong_Kong)]} {. LoadTimeZoneFile Asia/Hong_Kong.}.set TZData(:Hongkong) $TZData(:Asia/Hong_Kong).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.840758003302018
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqLGsA/8rtdVAIgvMGsA/8rN6+GAKyx/2RQqGsA/8ru:SlSWB9IZaM3yj6dVAIgv1b+XZx+RQj7
                                                                                      MD5:18DEAAAC045B4F103F2D795E0BA77B00
                                                                                      SHA1:F3B3FE5029355173CD5BA626E075BA73F3AC1DC6
                                                                                      SHA-256:9BB28A38329767A22CD073DF34E46D0AA202172A4116FBF008DDF802E60B743B
                                                                                      SHA-512:18140274318E913F0650D21107B74C07779B832C9906F1A2E98433B96AAEADF70D07044EB420A2132A6833EF7C3887B8927CFD40D272A13E69C74A63904F43C9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Atlantic/Reykjavik)]} {. LoadTimeZoneFile Atlantic/Reykjavik.}.set TZData(:Iceland) $TZData(:Atlantic/Reykjavik).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.75703014401897
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt+L6EL/liEi2eDcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL+LzM2eDkr
                                                                                      MD5:1E84F531F7992BFBD53B87831FE349E9
                                                                                      SHA1:E46777885945B7C151C6D46C8F7292FC332A5576
                                                                                      SHA-256:F4BDCAE4336D22F7844BBCA933795063FA1BCA9EB228C7A4D8222BB07A706427
                                                                                      SHA-512:545D6DEB94B7A13D69F387FE758C9FC474DC02703F2D485FD42539D3CE03975CDEEFB985E4AA7742957952AF9E9F1E2DB84389277C3864C32C31D890BD399FB9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Indian/Antananarivo) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.802684724729281
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5+L6EL9WJxwFFkXGm2OHi/FvvUcfJ7XH0VQGFr6VVFSTL:SlSWB9X5+LxWJxwFJm2OHqFvd+VQSr6e
                                                                                      MD5:4618C8D4F26C02A3A303DD1FB5DCFE46
                                                                                      SHA1:857D376F5AFE75784E7F578C83E111B2EE18F74E
                                                                                      SHA-256:94262B5A1E3423CD26BFFB3E36F63C1A6880304D00EE5B05985072D82032C765
                                                                                      SHA-512:3F5CDDE3D2D5C8BC3DD6423888D7DB6A8EA3D4881ABE9E3857B9D0DDF756D0ECD9CAB7EF66343B0636D32E5CCF0ECEC1F56B9F4BC521CD24B3DB1D935F994AF0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Chagos) {. {-9223372036854775808 17380 0 LMT}. {-1988167780 18000 0 +05}. {820436400 21600 0 +06}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):148
                                                                                      Entropy (8bit):4.911693487750565
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5+L6EL9FBIEW3v/kXGm2OHAWMx5vXTLyvMVSYvC:SlSWB9X5+LxpW3vTm2OHAnx5PTIMVSYK
                                                                                      MD5:5026A59BD9CCD6ABA665B4895EDB0171
                                                                                      SHA1:8361778F615EFDDAA660E49545249005B6FC66C3
                                                                                      SHA-256:37E1DAD2B019CCD6F8927602B079AD6DB7D71F55CBDA165B0A3EEF580B86DACF
                                                                                      SHA-512:E081BDE3FC0D07E75C83C308A662C3A1837A387137BFA8D8E4A59797159F465654BAFFCE6B1458602255BD784CEE0BF70F542C3E893BC87A566630D54084CDCC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Christmas) {. {-9223372036854775808 25372 0 LMT}. {-2364102172 25200 0 +07}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):146
                                                                                      Entropy (8bit):4.811431467315532
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5+L6EL9d/FkXGm2OHGXTvxoevXmVUXxXW5d6TW8C:SlSWB9X5+LxpJm2OHGXCeP3BG5Uq
                                                                                      MD5:4C9502EC642E813E7B699281DD9809DF
                                                                                      SHA1:98804A95F13CF4EED983AC019CD1A9EFC01AF719
                                                                                      SHA-256:E8C591860DD42374C64E30850A3626017989CF16DDB85FDCC111AD92BD311425
                                                                                      SHA-512:8BD7718055789FA7CFB2D50270C563E4D69E16283745701B07073A1CDA271F95B1884F297C2F22CB36EC9983BC759F03B05B39DFD0604CD3278DBCBFB6E12CA6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Cocos) {. {-9223372036854775808 23260 0 LMT}. {-2209012060 23400 0 +0630}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.775639640601132
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt+L6EL9TKlBx+DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL+LxGV+Dkr
                                                                                      MD5:DAD21C1CD103E6FF24ECB26ECC6CC783
                                                                                      SHA1:FBCCCF55EDFC882B6CB003E66B0B7E52A3E0EFDE
                                                                                      SHA-256:DA2F64ADC2674BE934C13992652F285927D8A44504327950678AD3B3EC285DCE
                                                                                      SHA-512:EA3B155D39D34AFB789F486FAA5F2B327ADB62E43FE5757D353810F9287D9E706773A034D3B2E5F050CCC2A24B31F28A8C44109CCCF43509F2B8547D107FD4A4
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Indian/Comoro) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):143
                                                                                      Entropy (8bit):4.822244827214297
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5+L6EL12hJFkXGm2OHvdFFr9vM0VQL:SlSWB9X5+L5Mm2OHlFFr1nVQL
                                                                                      MD5:5223EC10BCFBC18A9FA392340530E164
                                                                                      SHA1:A59B4F19A3F052B2A3EB57E0D2652E81FB665B50
                                                                                      SHA-256:17750D6A9B8ED41809D8DC976777A5252CCB70F39C3BF396B55557A8E504CB09
                                                                                      SHA-512:2B2EFC470FE4461F82B1F1909C2A953934938D5DC8B54B2DA3A48678CF23ECD7874187E0FA4F6241FC02AEE0AF29B861C3FEEC15BB90E5C7D3A609DBB50EDC2C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Kerguelen) {. {-9223372036854775808 0 0 -00}. {-631152000 18000 0 +05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):143
                                                                                      Entropy (8bit):4.873998321422911
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5+L6ELzJMyFkXGm2OHuVdF+YvXTW1U9VsRYvC:SlSWB9X5+L/TJm2OHWgYPhSQC
                                                                                      MD5:F8D00BD4AD23557FB4FC8EB095842C26
                                                                                      SHA1:AD4AE41D0AD49E80FCF8CADE6889459EA30B57F7
                                                                                      SHA-256:997C33DBCEA54DE671A4C4E0E6F931623BF4F39A821F9F15075B9ECCCCA3F1B8
                                                                                      SHA-512:F67D348ECCCA244681EE7B70F7815593CFB2D7D4502832B2EB653EBF01AC66ACED29F7EA2E223D295C4D4F64287D372070EF863CCB201ACD8DF470330812013D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Mahe) {. {-9223372036854775808 13308 0 LMT}. {-2006653308 14400 0 +04}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):176
                                                                                      Entropy (8bit):4.833774224054436
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5+L6ELzEyFkXGm2OHnz8evXZT5lxGYUQwGN0VQL:SlSWB9X5+L/EyJm2OHnz8ePZT5rG5QwI
                                                                                      MD5:EC0C456538BE81FA83AF440948EED55E
                                                                                      SHA1:11D7BA32A38547AF88F4182B6C1C3373AD89D75C
                                                                                      SHA-256:18A4B14CD05E4B25431BAF7BFCF2049491BF4E36BB31846D7F18F186C9ECD019
                                                                                      SHA-512:FF57F9EDFAD16E32B6A0BA656C5949A0A664D22001D5149BF036C322AEC1682E8B523C8E64E5A49B7EFA535A13459234C16237C09FC5B40F08AC22D56681C4BE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Maldives) {. {-9223372036854775808 17640 0 LMT}. {-2840158440 17640 0 MMT}. {-315636840 18000 0 +05}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):262
                                                                                      Entropy (8bit):4.450791926516311
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5+L/Hm2OHlNndSvulvSQFFYc0FZFeVhvSQFFbBjvVFZFbGlvSQC:MBp5+L/HmdHlNnS6jz0F7KZjbBjVF7bd
                                                                                      MD5:040680E086764FC47EEBE039358E223C
                                                                                      SHA1:4D10E6F69835533748DD5FD2E7409F9732221210
                                                                                      SHA-256:C4054D56570F9362AB8FF7E4DBA7F8032720289AE01C03A861CCD8DEC9D2ABB2
                                                                                      SHA-512:FC00B4AD7328EBC3025A482B3D6A0B176F3430BD3D06B918974EAC5BD30AD8551E0C6BE1DC03BE18A9BC6DD0919ED2A3717E20749ABECBFBD202764047D0D292
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Mauritius) {. {-9223372036854775808 13800 0 LMT}. {-1988164200 14400 0 +04}. {403041600 18000 1 +04}. {417034800 14400 0 +04}. {1224972000 18000 1 +04}. {1238274000 14400 0 +04}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):180
                                                                                      Entropy (8bit):4.778847657463255
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsVVMMvwVAIgNGExVMSt+L6ELzO1h4DcVVMMv:SlSWB9IZaM3y7VcVAIgNTxL+L/O1h4De
                                                                                      MD5:D89C649468B3C22CF5FA659AE590DE53
                                                                                      SHA1:83DF2C14F1E51F5B89DCF6B833E421389F9F23DC
                                                                                      SHA-256:071D17F347B4EB9791F4929803167497822E899761654053BD774C5A899B4B9C
                                                                                      SHA-512:68334E11AAB0F8DCEEB787429832A60F4F0169B6112B7F74048EACFDE78F9C4D100E1E2682D188C3965E41A83477D3AECC80B73A2A8A1A80A952E59B431576A8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Nairobi)]} {. LoadTimeZoneFile Africa/Nairobi.}.set TZData(:Indian/Mayotte) $TZData(:Africa/Nairobi).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):146
                                                                                      Entropy (8bit):4.933616581218054
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5+L6ELsActFkXGm2OHuU7oevUdvcUeNVsRYvC:SlSWB9X5+Lam2OHb7oezfNSQC
                                                                                      MD5:C50A592BB886F2FA48657900AE10789F
                                                                                      SHA1:16D73BFFDAD18E751968E100BB391AABB29169E1
                                                                                      SHA-256:3775EA8EBF5CBBD240E363FB62AEF8D2865A9D9969E40A15731DCC0AC03107EB
                                                                                      SHA-512:F875F287E6C3A7B7325DB038CF419AA34FD0072FD3FCD138102008959F397026B647D8D339CB01362330905382FE7DCF5F8EC98C9B8C4FFF59A6FF4E78678BB7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Indian/Reunion) {. {-9223372036854775808 13312 0 LMT}. {-1848886912 14400 0 +04}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):161
                                                                                      Entropy (8bit):4.757854680369306
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8g5YFevFVAIgNqjNAt+XiMr4WFKBun:SlSWB9IZaM3yA5owFVAIgcjSt+Xvr4wh
                                                                                      MD5:848663FD5F685FE1E14C655A0ABA7D6A
                                                                                      SHA1:59A1BEE5B3BE01FB9D2C73777B7B4F1615DCE034
                                                                                      SHA-256:DB6D0019D3B0132EF8B8693B1AB2B325D77DE3DD371B1AFDAE4904BE610BA2A6
                                                                                      SHA-512:B1F8C08AF68C919DB332E6063647AF15CB9FED4046C16BEF9A58203044E36A0D1E69BD1B8703B15003B929409A8D83238B5AA67B910B920F0674C8A0EB5CF125
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Tehran)]} {. LoadTimeZoneFile Asia/Tehran.}.set TZData(:Iran) $TZData(:Asia/Tehran).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):172
                                                                                      Entropy (8bit):4.778464205793726
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq85zFFwVAIgN0AzFzt+WXnMr4WFKYzFp:SlSWB9IZaM3yZbwVAIgCAb+zr4wKY7
                                                                                      MD5:B9D1F6BD0B0416791036C0E3402C8438
                                                                                      SHA1:E1A7471062C181B359C06804420091966B809957
                                                                                      SHA-256:E6EC28F69447C3D3DB2CB68A51EDCEF0F77FF4B563F7B65C9C71FF82771AA3E1
                                                                                      SHA-512:A5981FD91F6A9A84F44A6C9A3CF247F9BE3AB52CE5FE8EE1A7BE19DD63D0B22818BC15287FE73A5EEC8BCE6022B9EAF54A10AA719ADF31114E188F31EA273E92
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Jerusalem)]} {. LoadTimeZoneFile Asia/Jerusalem.}.set TZData(:Israel) $TZData(:Asia/Jerusalem).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):176
                                                                                      Entropy (8bit):4.668645988954937
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx00EIECpVAIg200EIEvvt9S//2IAcGE0EIEVn:SlSWB9IZaM3y7952VAIgp95vF029095V
                                                                                      MD5:EA38E93941E21CB08AA49A023DCC06FB
                                                                                      SHA1:1AD77CAC25DC6D1D04320FF2621DD8E7D227ECBF
                                                                                      SHA-256:21908F008F08C55FB48F1C3D1A1B2016BDB10ED375060329451DE4E487CF0E5F
                                                                                      SHA-512:D6F0684A757AD42B8010B80B4BE6542ADE96D140EC486B4B768E167502C776B8D289622FBC48BD19EB3D0B3BC4156715D5CCFC7952A479A990B07935B15D26DC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Jamaica)]} {. LoadTimeZoneFile America/Jamaica.}.set TZData(:Jamaica) $TZData(:America/Jamaica).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):159
                                                                                      Entropy (8bit):4.791469556628492
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8aowVAIgNqaF9hM7/4WFK6n:SlSWB9IZaM3ypwVAIgcaF4r4wK6n
                                                                                      MD5:338A18DEDF5A813466644B2AAE1A7CF5
                                                                                      SHA1:BB76CE671853780F4971D2E173AE71E82EA24690
                                                                                      SHA-256:535AF1A79CD01735C5D6FC6DB08C5B0EAFB8CF0BC89F7E943CF419CFA745CA26
                                                                                      SHA-512:4D44CC28D2D0634200FEA0537EBC5DD50E639365B89413C6BF911DC2B95B78E27F1B92733FB859C794A8C027EA89E45E8C2D6E1504FF315AF68DB02526226AD2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Tokyo)]} {. LoadTimeZoneFile Asia/Tokyo.}.set TZData(:Japan) $TZData(:Asia/Tokyo).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.759848173726549
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG1/EOM2wFVAIgObT1/EOM8O68/FMKpUDH1/EOMi:SlSWB9IZaM3yc1EiwFVAIgOb1E48xME+
                                                                                      MD5:A9C8CA410CA3BD4345BF6EAB53FAB97A
                                                                                      SHA1:57AE7E6D3ED855B1FBF6ABF2C9846DFA9B3FFF47
                                                                                      SHA-256:A63A99F0E92F474C4AA99293C4F4182336520597A86FCDD91DAE8B25AFC30B98
                                                                                      SHA-512:C97CF1301DCEEE4DE26BCEEB60545BB70C083CD2D13ED89F868C7856B3532473421599ED9E7B166EA53A9CF44A03245192223D47BC1104CEBD1BF0AC6BF10898
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Kwajalein)]} {. LoadTimeZoneFile Pacific/Kwajalein.}.set TZData(:Kwajalein) $TZData(:Pacific/Kwajalein).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):171
                                                                                      Entropy (8bit):4.779409803819657
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqsbKJqYkdVAIgNGEnKJuYvW67beDcbKJ9n:SlSWB9IZaM3y7JdVAIgNTnYvW6PeD9n
                                                                                      MD5:C4739F7B58073CC7C72EF2D261C05C5E
                                                                                      SHA1:12FE559CA2FEA3F8A6610B1D4F43E299C9FB7BA5
                                                                                      SHA-256:28A94D9F1A60980F8026409A65F381EDB7E5926A79D07562D28199B6B63AF9B4
                                                                                      SHA-512:B2DC5CB1AD7B6941F498FF3D5BD6538CAF0ED19A2908DE645190A5C5F40AF5B34752AE8A83E6C50D370EA619BA969C9AB7F797F171192200CDA1657FFFB7F05A
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Africa/Tripoli)]} {. LoadTimeZoneFile Africa/Tripoli.}.set TZData(:Libya) $TZData(:Africa/Tripoli).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7471
                                                                                      Entropy (8bit):3.7115445412724797
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:TJOwNDgaXSgm7VTslzZBYxWq9beN6db6yq3BgLjx1uuE0KRPGdNjClOQuonZ2ltb:bSV7xxWq9aYdbsC/eLdGLg9a
                                                                                      MD5:2F62D867C8605730BC8E43D300040D54
                                                                                      SHA1:06AD982DF03C7309AF01477749BAB9F7ED8935A7
                                                                                      SHA-256:D6C70E46A68B82FFC7A4D96FDA925B0FAAF973CB5D3404A55DFF2464C3009173
                                                                                      SHA-512:0D26D622511635337E5C03D82435A9B4A9BCA9530F940A70A24AE67EA4794429A5D68B59197B978818BEF0799C3D5FA792F5720965291661ED067570BC56226B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:MET) {. {-9223372036854775808 3600 0 MET}. {-1693706400 7200 1 MEST}. {-1680483600 3600 0 MET}. {-1663455600 7200 1 MEST}. {-1650150000 3600 0 MET}. {-1632006000 7200 1 MEST}. {-1618700400 3600 0 MET}. {-938905200 7200 1 MEST}. {-857257200 3600 0 MET}. {-844556400 7200 1 MEST}. {-828226800 3600 0 MET}. {-812502000 7200 1 MEST}. {-796777200 3600 0 MET}. {-781052400 7200 1 MEST}. {-766623600 3600 0 MET}. {228877200 7200 1 MEST}. {243997200 3600 0 MET}. {260326800 7200 1 MEST}. {276051600 3600 0 MET}. {291776400 7200 1 MEST}. {307501200 3600 0 MET}. {323830800 7200 1 MEST}. {338950800 3600 0 MET}. {354675600 7200 1 MEST}. {370400400 3600 0 MET}. {386125200 7200 1 MEST}. {401850000 3600 0 MET}. {417574800 7200 1 MEST}. {433299600 3600 0 MET}. {449024400 7200 1 MEST}. {465354000 3600 0 MET}. {481078800 7200 1 MEST}. {496803600 3600 0 MET
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):106
                                                                                      Entropy (8bit):4.856431808856169
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx56xwkXGm2OHrXV4fvYv:SlSWB9X562m2OHrCi
                                                                                      MD5:FF6BDAC2C77D8287B46E966480BFEACC
                                                                                      SHA1:4C90F910C74E5262A27CC65C3433D34B5D885243
                                                                                      SHA-256:FB6D9702FC9FB82779B4DA97592546043C2B7D068F187D0F79E23CB5FE76B5C2
                                                                                      SHA-512:CA197B25B36DD47D86618A4D39BFFB91FEF939BC02EEB96679D7EA88E5D38737D3FE6BD4FD9D16C31CA5CF77D17DC31E5333F4E28AB777A165050EA5A4D106BA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:MST) {. {-9223372036854775808 -25200 0 MST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8227
                                                                                      Entropy (8bit):3.755606924782105
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:xG5c2sGm+4I1zXN+C2mWBNQMsmNTxf6AeO+cblX:12dVUC2mWBNwWTxyWR
                                                                                      MD5:2AB5643D8EF9FD9687A5C67AEB04AF98
                                                                                      SHA1:2E8F1DE5C8113C530E5E6C10064DEA4AE949AAE6
                                                                                      SHA-256:97028B43406B08939408CB1DD0A0C63C76C9A352AEA5F400CE6D4B8D3C68F500
                                                                                      SHA-512:72A8863192E14A4BD2E05C508F8B376DD75BB4A3625058A97BBB33F7200B2012D92D445982679E0B7D11C978B80F7128B3A79B77938CEF6315AA6C4B1E0AC09C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:MST7MDT) {. {-9223372036854775808 -25200 0 MST}. {-1633273200 -21600 1 MDT}. {-1615132800 -25200 0 MST}. {-1601823600 -21600 1 MDT}. {-1583683200 -25200 0 MST}. {-880210800 -21600 1 MWT}. {-769395600 -21600 1 MPT}. {-765388800 -25200 0 MST}. {-84380400 -21600 1 MDT}. {-68659200 -25200 0 MST}. {-52930800 -21600 1 MDT}. {-37209600 -25200 0 MST}. {-21481200 -21600 1 MDT}. {-5760000 -25200 0 MST}. {9968400 -21600 1 MDT}. {25689600 -25200 0 MST}. {41418000 -21600 1 MDT}. {57744000 -25200 0 MST}. {73472400 -21600 1 MDT}. {89193600 -25200 0 MST}. {104922000 -21600 1 MDT}. {120643200 -25200 0 MST}. {126694800 -21600 1 MDT}. {152092800 -25200 0 MST}. {162378000 -21600 1 MDT}. {183542400 -25200 0 MST}. {199270800 -21600 1 MDT}. {215596800 -25200 0 MST}. {230720400 -21600 1 MDT}. {247046400 -25200 0 MST}. {262774800 -21600 1 MDT}. {278496000 -252
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):185
                                                                                      Entropy (8bit):4.836487818373659
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0qfSwVAIg20qfo6AdMSKBbh4IAcGEqfu:SlSWB9IZaM3y7eHVAIgpeo68K5h490eu
                                                                                      MD5:C3AEEA7B991B609A1CB253FDD5057D11
                                                                                      SHA1:0212056C2A20DD899FA4A26B10C261AB19D20AA4
                                                                                      SHA-256:599F79242382ED466925F61DD6CE59192628C7EAA0C5406D3AA98EC8A5162824
                                                                                      SHA-512:38094FD29B1C31FC9D894B8F38909DD9ED3A76B2A27F6BC250ACD7C1EFF4529CD0B29B66CA7CCBEB0146DFF3FF0AC4AEEEC422F7A93422EF70BF723D12440A93
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Tijuana)]} {. LoadTimeZoneFile America/Tijuana.}.set TZData(:Mexico/BajaNorte) $TZData(:America/Tijuana).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):186
                                                                                      Entropy (8bit):4.841665860441288
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0zjRJ+vFVAIg20zjRJZvt6AdMPCoQIAcGEzjRJ3:SlSWB9IZaM3y7zjRJQFVAIgpzjRJ1t6n
                                                                                      MD5:89A5ED35215BA46C76BF2BD5ED620031
                                                                                      SHA1:26F134644023A2D0DA4C8997C54E36C053AA1060
                                                                                      SHA-256:D624945E20F30CCB0DB2162AD3129301E5281B8868FBC05ACA3AA8B6FA05A9DF
                                                                                      SHA-512:C2563867E830F7F882E393080CE16A62A0CDC5841724E0D507CBA362DB8363BB75034986107C2428243680FE930BAC226E11FE6BA99C31E0C1A35D6DD1C14676
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Mazatlan)]} {. LoadTimeZoneFile America/Mazatlan.}.set TZData(:Mexico/BajaSur) $TZData(:America/Mazatlan).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):195
                                                                                      Entropy (8bit):4.8300311016675606
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7zBDdVAIgpzBy6BXl490zBw:MBaIMYzipzU6Bi90zi
                                                                                      MD5:E771850BA5A1C218EB1B31FDC564DF02
                                                                                      SHA1:3675838740B837A96FF32694D1FA56DE01DE064F
                                                                                      SHA-256:06A45F534B35538F32A77703C6523CE947D662D136C5EC105BD6616922AEEB44
                                                                                      SHA-512:BD7AF307AD61C310EDAF01E618BE9C1C79239E0C8CDEC85792624A7CCE1B6251B0ADE066B8610AFDB0179F3EF474503890642284800B81E599CB830EC6C7C9AA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Mexico_City)]} {. LoadTimeZoneFile America/Mexico_City.}.set TZData(:Mexico/General) $TZData(:America/Mexico_City).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):174
                                                                                      Entropy (8bit):4.8398862338201765
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG/u4pVAIgObT/NCxL5E1nUDH/uvn:SlSWB9IZaM3ycqIVAIgOboLivn
                                                                                      MD5:7B274C782E9FE032AC4B3E137BF147BB
                                                                                      SHA1:8469D17EC75D0580667171EFC9DE3FDF2C1E0968
                                                                                      SHA-256:2228231C1BEF0173A639FBC4403B6E5BF835BF5918CC8C16757D915A392DBF75
                                                                                      SHA-512:AE72C1F244D9457C70A120FD00F2C0FC2BDC467DBD5C203373291E00427499040E489F2B1358757EA281BA8143E28FB54D03EDE67970F74DACFCB308AC7F74CE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Auckland)]} {. LoadTimeZoneFile Pacific/Auckland.}.set TZData(:NZ) $TZData(:Pacific/Auckland).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):176
                                                                                      Entropy (8bit):4.832832776993659
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG9WQ+DdVAIgObT9WQrF5AmtBFB/pUDH9WQpn:SlSWB9IZaM3ycwQ+DdVAIgObwQ5zzJjA
                                                                                      MD5:C8D83C210169F458683BB35940E11DF6
                                                                                      SHA1:278546F4E33AD5D0033AF6768EFAB0DE247DA74F
                                                                                      SHA-256:CECF81746557F6F957FEF12DBD202151F614451F52D7F6A35C72B830075C478D
                                                                                      SHA-512:4539AE6F7AF7579C3AA5AE4DEB97BD14ED83569702D3C4C3945DB06A2D8FFF260DA1DB21FF21B0BED91EE9C993833D471789B3A99C9A2986B7AC8ABFBBE5A8B7
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Chatham)]} {. LoadTimeZoneFile Pacific/Chatham.}.set TZData(:NZ-CHAT) $TZData(:Pacific/Chatham).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):172
                                                                                      Entropy (8bit):4.80475858956378
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx06RGFwVAIg206RAO0L5vf1+IAcGE6Ru:SlSWB9IZaM3y7+SwVAIgp+iLpd+90+u
                                                                                      MD5:38C56298E75306F39D278F60B50711A6
                                                                                      SHA1:8FD9CEAD17CCD7D981CEF4E782C3916BFEF2D11F
                                                                                      SHA-256:E10B8574DD83C93D3C49E9E2226148CBA84538802316846E74DA6004F1D1534D
                                                                                      SHA-512:F6AA67D78A167E553B97F092CC3791B591F800A6D286BE37C06F7ECABDFBCF43A397AEDC6E3EB9EB6A1CB95E8883D4D4F97890CA1877930AFCD5643B0C8548E9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Denver)]} {. LoadTimeZoneFile America/Denver.}.set TZData(:Navajo) $TZData(:America/Denver).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):166
                                                                                      Entropy (8bit):4.854287452296565
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qvwVAIgNtAnL75h4WFKdv:SlSWB9IZaM3yMwVAIgEH5h4wKt
                                                                                      MD5:AF9DD8961DB652EE1E0495182D99820D
                                                                                      SHA1:979602E3C59719A67DE3C05633242C12E0693C43
                                                                                      SHA-256:9A6109D98B35518921E4923B50053E7DE9B007372C5E4FFF75654395D6B56A82
                                                                                      SHA-512:F022C3EFABFC3B3D3152C345ACD28387FFEA4B61709CBD42B2F3684D33BED469C4C25F2328E5E7D9D74D968E25A0419E7BCFF0EB55650922906B9D3FF57B06C8
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Shanghai)]} {. LoadTimeZoneFile Asia/Shanghai.}.set TZData(:PRC) $TZData(:Asia/Shanghai).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8227
                                                                                      Entropy (8bit):3.751820462019181
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:9d89jJC2ZCHtffWsBNwj/lpmlOxGcKcnRH31t+ucgge:49jgNf+aNwj/lpmlOxnKcndIG
                                                                                      MD5:DB5250A28A3853951AF00231677AACAC
                                                                                      SHA1:1FC1DA1121B9F5557D246396917205B97F6BC295
                                                                                      SHA-256:4DFC264F4564957F333C0208DA52DF03301D2FD07943F53D8B51ECCDD1CB8153
                                                                                      SHA-512:72594A17B1E29895A6B4FC636AAE1AB28523C9C8D50118FA5A7FDFD3944AD3B742B17B260A69B44756F4BA1671268DD3E8223EF314FF7850AFB81202BA2BBF44
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:PST8PDT) {. {-9223372036854775808 -28800 0 PST}. {-1633269600 -25200 1 PDT}. {-1615129200 -28800 0 PST}. {-1601820000 -25200 1 PDT}. {-1583679600 -28800 0 PST}. {-880207200 -25200 1 PWT}. {-769395600 -25200 1 PPT}. {-765385200 -28800 0 PST}. {-84376800 -25200 1 PDT}. {-68655600 -28800 0 PST}. {-52927200 -25200 1 PDT}. {-37206000 -28800 0 PST}. {-21477600 -25200 1 PDT}. {-5756400 -28800 0 PST}. {9972000 -25200 1 PDT}. {25693200 -28800 0 PST}. {41421600 -25200 1 PDT}. {57747600 -28800 0 PST}. {73476000 -25200 1 PDT}. {89197200 -28800 0 PST}. {104925600 -25200 1 PDT}. {120646800 -28800 0 PST}. {126698400 -25200 1 PDT}. {152096400 -28800 0 PST}. {162381600 -25200 1 PDT}. {183546000 -28800 0 PST}. {199274400 -25200 1 PDT}. {215600400 -28800 0 PST}. {230724000 -25200 1 PDT}. {247050000 -28800 0 PST}. {262778400 -25200 1 PDT}. {278499600 -288
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5431
                                                                                      Entropy (8bit):3.5627170055641306
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:2DBgcGFG9qbhX7zHJ4uoyM/15WNQ+NyVy:2DBgcGFGkXxaD/CR
                                                                                      MD5:6718CD07DCEBD2CA85FC1764BE45E46C
                                                                                      SHA1:0BCD2E4267F2BDB499EA613C17B9C38CCFC2177A
                                                                                      SHA-256:5D3D1B4180482099119383DC160520DCDA5D4E3EEC87F22EA20B7D4B599F5249
                                                                                      SHA-512:95C16BC92B9B3C80F9FA10F5B49DAEB472D45C2489A455A31177A8679E21EF668F85450E1770CFB77CA43477B68EF11B3A4090C11CE6F7FA518040EA7B502855
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Apia) {. {-9223372036854775808 45184 0 LMT}. {-2445424384 -41216 0 LMT}. {-1861878784 -41400 0 -1130}. {-631110600 -39600 0 -11}. {1285498800 -36000 1 -11}. {1301752800 -39600 0 -11}. {1316872800 -36000 1 -11}. {1325239200 50400 0 +13}. {1333202400 46800 0 +13}. {1348927200 50400 1 +13}. {1365256800 46800 0 +13}. {1380376800 50400 1 +13}. {1396706400 46800 0 +13}. {1411826400 50400 1 +13}. {1428156000 46800 0 +13}. {1443276000 50400 1 +13}. {1459605600 46800 0 +13}. {1474725600 50400 1 +13}. {1491055200 46800 0 +13}. {1506175200 50400 1 +13}. {1522504800 46800 0 +13}. {1538229600 50400 1 +13}. {1554559200 46800 0 +13}. {1569679200 50400 1 +13}. {1586008800 46800 0 +13}. {1601128800 50400 1 +13}. {1617458400 46800 0 +13}. {1632578400 50400 1 +13}. {1648908000 46800 0 +13}. {1664028000 50400 1 +13}. {1680357600 46800 0 +13}. {169
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8487
                                                                                      Entropy (8bit):3.8173754903771018
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:WNj7nBIc0fw4eJ7a1N1oKe13aNiWbF8sYBpYhuVn:Cmc3J7a1N18QOs8
                                                                                      MD5:6C008D6437C7490EE498605B5B096FDB
                                                                                      SHA1:D7F6E7B3920C54EFE02A44883DBCD0A75C7FC46A
                                                                                      SHA-256:B5BD438B748BA911E0E1201A83B623BE3F8130951C1377D278A7E7BC9CB7F672
                                                                                      SHA-512:DA6992D257B1BA6124E39F90DDEE17DC3E2F3B38C3A68B77A93065E3E5873D28B8AE5D21CEC223BAADFBDD1B3A735BF1CEC1BDEB0C4BEAB72AAA23433A707207
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Auckland) {. {-9223372036854775808 41944 0 LMT}. {-3192435544 41400 0 NZMT}. {-1330335000 45000 1 NZST}. {-1320057000 41400 0 NZMT}. {-1300699800 43200 1 NZST}. {-1287396000 41400 0 NZMT}. {-1269250200 43200 1 NZST}. {-1255946400 41400 0 NZMT}. {-1237800600 43200 1 NZST}. {-1224496800 41400 0 NZMT}. {-1206351000 43200 1 NZST}. {-1192442400 41400 0 NZMT}. {-1174901400 43200 1 NZST}. {-1160992800 41400 0 NZMT}. {-1143451800 43200 1 NZST}. {-1125914400 41400 0 NZMT}. {-1112607000 43200 1 NZST}. {-1094464800 41400 0 NZMT}. {-1081157400 43200 1 NZST}. {-1063015200 41400 0 NZMT}. {-1049707800 43200 1 NZST}. {-1031565600 41400 0 NZMT}. {-1018258200 43200 1 NZST}. {-1000116000 41400 0 NZMT}. {-986808600 43200 1 NZST}. {-968061600 41400 0 NZMT}. {-955359000 43200 1 NZST}. {-936612000 41400 0 NZMT}. {-923304600 43200 1 NZST}. {-757425600 43200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):270
                                                                                      Entropy (8bit):4.659789664861683
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5Ftgm2OHHhp5PZiuoDZDVeXU8vScCv/yZEiIv:MBp5FtgmdHf5PZiDZJek8HCvK6iIv
                                                                                      MD5:A85F8A9502E818ADE7759166B9C7A9AD
                                                                                      SHA1:5E706E5491AFE1A8399D7815158924381A1F6D27
                                                                                      SHA-256:C910696B4CC7CA3E713EE08A024D26C1E4E4003058DECD5B54B92A0B2F8A17E0
                                                                                      SHA-512:682BDC7DA0C9BFFD98992973295E180FB3FAACEA514760211B5291AEE26CABF200B68CA0EA80D9083C52F32C2EE3D0A5E84141363D1784C2A6A9FD24C2CF38E9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Bougainville) {. {-9223372036854775808 37336 0 LMT}. {-2840178136 35312 0 PMMT}. {-2366790512 36000 0 +10}. {-868010400 32400 0 +09}. {-768906000 36000 0 +10}. {1419696000 39600 0 +11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7907
                                                                                      Entropy (8bit):3.5670394561999235
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:1zwIBIWUkebw49ikidrGlb0D6DALquK8KfStVt:1jIbw49ikiAcWuB
                                                                                      MD5:5DF25A6A6E7322528FE41B6FD5FE5119
                                                                                      SHA1:E84915BA27443F01243050D648DF6388A1E8EDBA
                                                                                      SHA-256:B6727010950418F6FC142658C74EE1D717E7FD2B46267FC215E53CA3D55E894E
                                                                                      SHA-512:842ABE39AB26713D523A36895D7435DC2058846431CB2A0B7B47E204F8C315ADB855F95EC2852D57B73ECA0576CB1A49BB104C0D7BB9DE2E96143DA9C77F9A58
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Chatham) {. {-9223372036854775808 44028 0 LMT}. {-3192437628 44100 0 +1215}. {-757426500 45900 0 +1245}. {152632800 49500 1 +1245}. {162309600 45900 0 +1245}. {183477600 49500 1 +1245}. {194968800 45900 0 +1245}. {215532000 49500 1 +1245}. {226418400 45900 0 +1245}. {246981600 49500 1 +1245}. {257868000 45900 0 +1245}. {278431200 49500 1 +1245}. {289317600 45900 0 +1245}. {309880800 49500 1 +1245}. {320767200 45900 0 +1245}. {341330400 49500 1 +1245}. {352216800 45900 0 +1245}. {372780000 49500 1 +1245}. {384271200 45900 0 +1245}. {404834400 49500 1 +1245}. {415720800 45900 0 +1245}. {436284000 49500 1 +1245}. {447170400 45900 0 +1245}. {467733600 49500 1 +1245}. {478620000 45900 0 +1245}. {499183200 49500 1 +1245}. {510069600 45900 0 +1245}. {530632800 49500 1 +1245}. {541519200 45900 0 +1245}. {562082400 49500 1 +1245}. {5735736
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):145
                                                                                      Entropy (8bit):4.989695428683993
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDH9CoFeEXGm2OHIOYvXmdcnWZUUJv:SlSWB9X5ZzLm2OHNYPmdcXQ
                                                                                      MD5:61C075090B025E69800B23E0AD60459F
                                                                                      SHA1:F847CA6D35BD4AF2C70B318D4EE4A2FB5C77D449
                                                                                      SHA-256:3237743592D8719D0397FA278BB501E6F403985B643D1DE7E2DA91DD11BE215B
                                                                                      SHA-512:5D07FB2FEAA9110D62CFD95BC729AA57F2A176C977D2E2C00374AF36EE84C4FB9416ECBEF179298928AAE9634B69C5FE889C5C9D2DFF290CAC0F6E53EDEC1A48
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Chuuk) {. {-9223372036854775808 36428 0 LMT}. {-2177489228 36000 0 +10}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7935
                                                                                      Entropy (8bit):3.4518545894421475
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:OX45AGaHe2Y9btlqStWdmPndSy//TQMpeQkZyYbK6HdtLQOXJ/+:OX45AGdT9ZtWdmPnZ/TQfbbKsXJ2
                                                                                      MD5:9B0B358E33E33FEFE38BEF73232919F3
                                                                                      SHA1:7164F24730A37875128BE3F2FB4E9BC076AB9F39
                                                                                      SHA-256:E02B71C59DF59109D12EBE60ED153922F1DFF3F5C4AD207E267AB025792C51F4
                                                                                      SHA-512:A0C4A98B0B40FDE690A8EEE7A2C2F16C3E70C6F406FF0699B98CB837C72C6A1259395167795F2CFBBD2943E602AC0483C62B9D6209B8258018F7D78E103BBB15
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Easter) {. {-9223372036854775808 -26248 0 LMT}. {-2524495352 -26248 0 EMT}. {-1178124152 -25200 0 -07}. {-36619200 -21600 1 -07}. {-23922000 -25200 0 -07}. {-3355200 -21600 1 -07}. {7527600 -25200 0 -07}. {24465600 -21600 1 -07}. {37767600 -25200 0 -07}. {55915200 -21600 1 -07}. {69217200 -25200 0 -07}. {87969600 -21600 1 -07}. {100666800 -25200 0 -07}. {118209600 -21600 1 -07}. {132116400 -25200 0 -07}. {150868800 -21600 1 -07}. {163566000 -25200 0 -07}. {182318400 -21600 1 -07}. {195620400 -25200 0 -07}. {213768000 -21600 1 -07}. {227070000 -25200 0 -07}. {245217600 -21600 1 -07}. {258519600 -25200 0 -07}. {277272000 -21600 1 -07}. {289969200 -25200 0 -07}. {308721600 -21600 1 -07}. {321418800 -25200 0 -07}. {340171200 -21600 1 -07}. {353473200 -25200 0 -07}. {371620800 -21600 1 -07}. {384922800 -21600 0 -06}. {403070400 -180
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):705
                                                                                      Entropy (8bit):4.002147979275868
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp5cJmdH6mv6kJ2RX/x6DydjX2tHcsXFX2hE5zuGqptxv:cuesUMkGdXWF3A
                                                                                      MD5:48DEC5B1A9AADA4F09D03FEB037A2FE8
                                                                                      SHA1:6D25E80F0570236565F098DD0A637F546957F117
                                                                                      SHA-256:4F9AC8B0FE89990E8CF841EED9C05D92D53568DE772247F70A70DC11CBD78532
                                                                                      SHA-512:0FA4693F3FDAB12DB04B6D50E0782A352CF95A7C2765CF1906BAA35355755E324E1B17005DF3748DBE42743FE824AE983316958B2EC0A9B0B7D136BEC06AB983
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Efate) {. {-9223372036854775808 40396 0 LMT}. {-1829387596 39600 0 +11}. {433256400 43200 1 +11}. {448977600 39600 0 +11}. {467298000 43200 1 +11}. {480427200 39600 0 +11}. {496760400 43200 1 +11}. {511876800 39600 0 +11}. {528210000 43200 1 +11}. {543931200 39600 0 +11}. {559659600 43200 1 +11}. {575380800 39600 0 +11}. {591109200 43200 1 +11}. {606830400 39600 0 +11}. {622558800 43200 1 +11}. {638280000 39600 0 +11}. {654008400 43200 1 +11}. {669729600 39600 0 +11}. {686062800 43200 1 +11}. {696340800 39600 0 +11}. {719931600 43200 1 +11}. {727790400 39600 0 +11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):208
                                                                                      Entropy (8bit):4.767926806075848
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5Vm2OH1oePmWXytFBVyv7fPfTVVFmv:MBp5VmdH15PZsBVyDXfZvY
                                                                                      MD5:D7EE7623A410715B1F34DC06F5400996
                                                                                      SHA1:1ADD299AB66A0BCC32D92EAFBC2CA3B277E1FA3D
                                                                                      SHA-256:8CAF3AE352EC168BC0C948E788BB3CBFE3991F36A678A24B47711543D450AED8
                                                                                      SHA-512:356C3ECC40211B36FA1ECF8601AA8FAAE8080606F55AA4E706D239B8EE35ADE3987708716376D73053DB7A59B9A9B7A267EEDA6ED2A80A558FABA48E851C0EB1
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Enderbury) {. {-9223372036854775808 -41060 0 LMT}. {-2177411740 -43200 0 -12}. {307627200 -39600 0 -11}. {788871600 46800 0 +13}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):178
                                                                                      Entropy (8bit):4.865240332098143
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDH4ErKYvcXGm2OH18VkevXmUENBBdNiCPFVFv74v:SlSWB9X5BE3Lm2OH1VePmH7fP+v
                                                                                      MD5:6CC11F5FAA361F69262AB8E7F4DB4F90
                                                                                      SHA1:EA7ED940C0A3B5941972439DE1D735B4DC4AE0AA
                                                                                      SHA-256:21C4C35919A24CD9C80BE1BD51C6714AA7EBF447396B3A2E63D330D905FA9945
                                                                                      SHA-512:152709462F29EE14A727BE625E7ABD59625B6C4D4B36A2CE76B68D96CD176EDECA91DF26DAC553346ED360F2CA0F6C62981F50B088AE7BE1B998B425D91EF3B5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Fakaofo) {. {-9223372036854775808 -41096 0 LMT}. {-2177411704 -39600 0 -11}. {1325242800 46800 0 +13}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5505
                                                                                      Entropy (8bit):3.545141446818078
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:9ebtKf1V/ncXDwwn+q5Y6h+ueDJyqm5DHzv:EbIf1V/nGD5n+q5YPO
                                                                                      MD5:67BE85DD77F7B520FD5705A4412157E3
                                                                                      SHA1:04FA33692B8DBB8DDF89EF790646A0535943953D
                                                                                      SHA-256:2FE87FF4AEBB58506B4E2552D3CB66AAC1D038D8C62F8C70B0EAF1CC508EC9FA
                                                                                      SHA-512:35D4C46D187912D2B39C07A50DB0C56427ACF3755AD4B563B734BE26CA9C441AA0C2836266C803919786BF6DA9118A880CCF221FE9F9A9E30D610BE8E4913A9F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Fiji) {. {-9223372036854775808 42944 0 LMT}. {-1709985344 43200 0 +12}. {909842400 46800 1 +12}. {920124000 43200 0 +12}. {941896800 46800 1 +12}. {951573600 43200 0 +12}. {1259416800 46800 1 +12}. {1269698400 43200 0 +12}. {1287842400 46800 1 +12}. {1299333600 43200 0 +12}. {1319292000 46800 1 +12}. {1327154400 43200 0 +12}. {1350741600 46800 1 +12}. {1358604000 43200 0 +12}. {1382796000 46800 1 +12}. {1390050000 43200 0 +12}. {1414850400 46800 1 +12}. {1421503200 43200 0 +12}. {1446300000 46800 1 +12}. {1452952800 43200 0 +12}. {1478354400 46800 1 +12}. {1484402400 43200 0 +12}. {1509804000 46800 1 +12}. {1515852000 43200 0 +12}. {1541253600 46800 1 +12}. {1547301600 43200 0 +12}. {1572703200 46800 1 +12}. {1579356000 43200 0 +12}. {1604152800 46800 1 +12}. {1610805600 43200 0 +12}. {1636207200 46800 1 +12}. {1642255200 43200
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):148
                                                                                      Entropy (8bit):4.974991227981989
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDH4QwyFtXGm2OHwodGevXmcpXrWXVN0UIvYv:SlSWB9X5BCEm2OHwxePmgSX0a
                                                                                      MD5:23994D1C137B8BC2BA6E97739B38E7BD
                                                                                      SHA1:36772677B3C869C49A829AF08486923321ADD50A
                                                                                      SHA-256:F274C6CD08E5AA46FDEA219095DA8EA60DA0E95E5FD1CBCB9E6611DE47980F9E
                                                                                      SHA-512:CB2DB35960D11322AD288912C5D82C8C579791E40E510A90D34AAB20136B17AA019EFD55D1C4A2D9E88F7AF79F15779AF7EC6856F3085161AC84C93872C61176
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Funafuti) {. {-9223372036854775808 43012 0 LMT}. {-2177495812 43200 0 +12}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):238
                                                                                      Entropy (8bit):4.63034174284777
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5fEjFJm2OHvQYezie7KV9dRncRviWFrN5/uFfXFfrin:MBp5fSFJmdH0zV7O9DdWFN5/uFfXdGn
                                                                                      MD5:307B016C9E6A915B1760D9A6AD8E63C1
                                                                                      SHA1:26B797811821C09CF6BAB76E05FF612359DF7318
                                                                                      SHA-256:F1CB2B1EBD4911857F5F183E446A22E731BD57925AD07B15CA78A7BDDFED611F
                                                                                      SHA-512:F7AAAEE32CAC84F7D54C29E07CB8952D61585B85CB4FFFB93DD824A71403FDF356EC0761E5EEE19D9F8139F11A9CAB0A7DAEADBD13B6DD4C0CDF9FB573794542
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Galapagos) {. {-9223372036854775808 -21504 0 LMT}. {-1230746496 -18000 0 -05}. {504939600 -21600 0 -06}. {722930400 -18000 1 -06}. {728888400 -21600 0 -06}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):149
                                                                                      Entropy (8bit):4.931482658662627
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDH5hBfcXGm2OHKToxYvUdNfiuvn:SlSWB9X5kTm2OHPxYYquv
                                                                                      MD5:98754C9D99442282F5C911725764C5D1
                                                                                      SHA1:7E679DC38A7C7873695E10814B04E3919D1BFB41
                                                                                      SHA-256:7D09014BE33CB2B50554B6937B3E870156FDCB5C36E9F8E8925711E79C12FC74
                                                                                      SHA-512:2044AEEDFEF948E502667D1C60E22814202E4BA657DE89A962B6E9E160A93B3B77BF0AC4F5159FC45D43B2038E624D90A4589FB87F3449CA10D350EF60373D17
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Gambier) {. {-9223372036854775808 -32388 0 LMT}. {-1806678012 -32400 0 -09}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):151
                                                                                      Entropy (8bit):4.934129846149006
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDH5RyJTLJyFkXGm2OHddHvpoxYvUdMWdHPVmv:SlSWB9X5LJHgm2OHdFGxYAHPAv
                                                                                      MD5:193872CE34E69F8B499203BC70C2639B
                                                                                      SHA1:7A2B8E346E3BF3BE48AAA330C3EEE47332E994AB
                                                                                      SHA-256:F1D21C339E8155711AA7EF9F4059A738A8A4CE7A6B78FFDD8DCC4AC0DB5A0010
                                                                                      SHA-512:D2114AD27922799B8C38B0486D1FAE838EC94A461388960A6F2D19F7763E09FF75A9C4619C52BE2626E8EA2275794B694C1A76E2711D10B77CE6E34259DBF2BE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Guadalcanal) {. {-9223372036854775808 38388 0 LMT}. {-1806748788 39600 0 +11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):204
                                                                                      Entropy (8bit):4.833752908914461
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5bm2OHauezyRtAePmdSUUyWGHZFUeMn:MBp5bmdHanzCtBP1yWleMn
                                                                                      MD5:AD14439D9E27F2D3545E17082150DC75
                                                                                      SHA1:43DE1D4A90ABE54320583FAB46E6F9B428C0B577
                                                                                      SHA-256:CE4D3D493E625DA15A8B4CD3008D9CBDF20C73101C82F4D675F5B773F4A5CF70
                                                                                      SHA-512:77800323ED5AF49DA5E6314E94938BEAAEDD69BB61E338FAF024C3A22747310307A13C6CBBAFE5A48164855B238C2CAD354426F0EE7201B4FB5C129D68CB0E3B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Guam) {. {-9223372036854775808 -51660 0 LMT}. {-3944626740 34740 0 LMT}. {-2177487540 36000 0 GST}. {977493600 36000 0 ChST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):332
                                                                                      Entropy (8bit):4.582125163058844
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5PeQm2OHsVVPBraX3UNFvDrUXaWFvjHovLnvRY7p0:MBp5WQmdH0VPBa0VOT12G7O
                                                                                      MD5:17ACB888B597247CB0CA3CA191E51640
                                                                                      SHA1:9C2668BF0288D277ED2FE5DBCD5C34F5931004A6
                                                                                      SHA-256:719EA0BC1762078A405936791C65E4255B4250FB2B305342FE768A21D6AF34BE
                                                                                      SHA-512:9D02F784F0CD2195AEDEAA59E3ECD64B27928D48DCBC3EA2651B36B3BE7F8C6D9CBB66ACDC76DC02D94DF19C0A29306DD8C2A15AD89C24188FC3E4BCFBE6D456
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Honolulu) {. {-9223372036854775808 -37886 0 LMT}. {-2334101314 -37800 0 HST}. {-1157283000 -34200 1 HDT}. {-1155436200 -34200 0 HST}. {-880201800 -34200 1 HWT}. {-769395600 -34200 1 HPT}. {-765376200 -37800 0 HST}. {-712150200 -36000 0 HST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):188
                                                                                      Entropy (8bit):4.795254976384326
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG2fWGYFedVAIgObT2fWzvNnUDH0KNyFx/hpUDH2fe:SlSWB9IZaM3yc6e8dVAIgOb6ezvNNWya
                                                                                      MD5:FA20CE420C5370C228EB169BBC083EFB
                                                                                      SHA1:5B4C221AC97292D5002F6ABEB6BC66D7B8E2F01B
                                                                                      SHA-256:83A14BF52D181B3229603393EA90B9535A2FF05E3538B8C9AD19F483E6447C09
                                                                                      SHA-512:7E385FEBD148368F192FC6B1D5E4B8DD31F58EC4329BF9820D554E97402D0A582AB2EBCF46A5151D0167333349A83476BEB11C49BC0EBAADE5A297C42879E0C3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Honolulu)]} {. LoadTimeZoneFile Pacific/Honolulu.}.set TZData(:Pacific/Johnston) $TZData(:Pacific/Honolulu).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):211
                                                                                      Entropy (8bit):4.684652862044272
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDH1meEXGm2OHjToevXmUBepRGFz4vQU8F/5f5vARVvVtQCn:SlSWB9X5iLm2OHjkePmLSz4YjRfSzvJn
                                                                                      MD5:E22A2C0F847601F128986A48A4B72F90
                                                                                      SHA1:4E1D047DC64AA57C311A22FB1DA8497CD7022192
                                                                                      SHA-256:88260F34784960C229B2B282F8004FD1AF4BE1BC2883AAEE7D041A622933C3FE
                                                                                      SHA-512:A80DAC1A2A3376A47E2A542DE92CCC733E440AF2F05A70823DA52A2490FC9D1762F35CE256E6D1F7CCD435EEFBD6B0FBC533459CD3AD79ACD52C7CA78C29317C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Kiritimati) {. {-9223372036854775808 -37760 0 LMT}. {-2177415040 -38400 0 -1040}. {307622400 -36000 0 -10}. {788868000 50400 0 +14}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):201
                                                                                      Entropy (8bit):4.763096849699127
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDH1+AtFkXGm2OHHvvXmc03VLpCcfzvwX0UIv4Q9Hmv:SlSWB9X598Jm2OHHvPmb9fLYX01Yv
                                                                                      MD5:96235B4DD81BA681216B74046A5A8780
                                                                                      SHA1:24D682CE5D7C4A3DF8C860CB80ED262085CB965C
                                                                                      SHA-256:BE400ED502FA7EC34B8DE44B2A3D0AF3033292EF08FD1F5F276147E15460CFF6
                                                                                      SHA-512:4B30A0A1806D5D96FE5F9B1208490E23EABB498B634C98D89553059E68292AAAB6B182FE367E2923DBE0BC03D023D9EFC0EC25F5DD19AB8AE878B32478FF4B55
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Kosrae) {. {-9223372036854775808 39116 0 LMT}. {-2177491916 39600 0 +11}. {-7988400 43200 0 +12}. {915105600 39600 0 +11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):205
                                                                                      Entropy (8bit):4.788662012960935
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5yErm2OH4T2ePmvfL/XytdrH0a:MBp5XrmdHWPoL8rUa
                                                                                      MD5:885C86BCE6B3D83D9CD715D75170AA81
                                                                                      SHA1:9607AC6B1756FEBF2BEC2A78138AF12C11FD46F6
                                                                                      SHA-256:2E636A3576119F2976D2029E75F26A060A5C0800BF7B719F1CB4562D896A6432
                                                                                      SHA-512:410D32CBAB0C1B9D948C2C1416B6D158650600748F1C96D16121DB5F0A9D8384A14067E8603576ED1101BD62F6529C6E7A129428B77CBA1D185214D051F2C6B2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Kwajalein) {. {-9223372036854775808 40160 0 LMT}. {-2177492960 39600 0 +11}. {-7988400 -43200 0 -12}. {745848000 43200 0 +12}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):173
                                                                                      Entropy (8bit):4.868505550342842
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHznHLXGm2OHy3HuxYvXmcQ/VpCcfzvwX0UIvYv:SlSWB9X5Qim2OHyexYPmf/ffLYX0a
                                                                                      MD5:5664FAB6368844F8139F48C32A1486B9
                                                                                      SHA1:55826443FB44D44B5331082568E2C46257A0F726
                                                                                      SHA-256:CBBB814CE6E9F2FA1C8F485BBDB0B759FDA8C859BC989EC28D4756CC10B21A82
                                                                                      SHA-512:1BD1D6C2224E0DCC7A1887ECEB38C64E8DEABF44BE52FE29C5A302BAD95C0EB9DBD20E5738F3916B8902FA084606E07BE3723C1BE62416EB1E6DC4AD215A56F0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Majuro) {. {-9223372036854775808 41088 0 LMT}. {-2177493888 39600 0 +11}. {-7988400 43200 0 +12}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):153
                                                                                      Entropy (8bit):4.930595315407702
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHzrHeHkXGm2OHOx5vUdNpNFvvIVVCC:SlSWB9X5cHeLm2OHOnY/FvQVVL
                                                                                      MD5:B41251BE6A78B9BA4F7859D344517738
                                                                                      SHA1:8C0DFDD40B8AE1DFA6C3C1BDD44E8452F5EE49E1
                                                                                      SHA-256:FC06B45FB8C5ED081BAFA999301354722AEF17DB2A9C58C6CDF81C758E63D899
                                                                                      SHA-512:96D302EAA274BEE26325B8334DA8C3782B8DC0E279DDF464D281AF2B0CEE19E9254837A4B1D08F9B777BE892F639D205F6AB85C37C8F8B58A4867EA082FF054B
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Marquesas) {. {-9223372036854775808 -33480 0 LMT}. {-1806676920 -34200 0 -0930}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):189
                                                                                      Entropy (8bit):4.763101291800624
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQGurKeTIVAIgObTurKeUAtnUDHz0HvUDHurKeTv:SlSWB9IZaM3ycieZVAIgObieiZeg
                                                                                      MD5:A5A67AC85621952E16528DD73C94346E
                                                                                      SHA1:FB3D1AD833CD77B8FE68AC37FAA39FF4A9A69815
                                                                                      SHA-256:B4C19E4D05CCBC73ABE5389EBCFCC5586036C1D2275434003949E1CF634B9C26
                                                                                      SHA-512:5BB96561582BA3E9F2973322BCF76BD3F9023EC965A0CB504DFE13C127CA2ED562D040EC033DDB946FBB17E9FDD2EAB7532F88B2B0F1182CE880E41C920CFD36
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pago_Pago)]} {. LoadTimeZoneFile Pacific/Pago_Pago.}.set TZData(:Pacific/Midway) $TZData(:Pacific/Pago_Pago).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):235
                                                                                      Entropy (8bit):4.6089214752758965
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5Jem2OHceR6sCHST0ikvScCdpShcX0a:MBp5JemdH9sxZHCDEta
                                                                                      MD5:CBC3FE6B512B0A3E96B7F47E4CD830EB
                                                                                      SHA1:A1962DF38BED723F8F747B8931B57FAAC2E8291C
                                                                                      SHA-256:8118062E25736A4672B11D6A603B5A8FE2ED1A82E1814261DF087EA3071A7DD7
                                                                                      SHA-512:18E0975189794068033AD000D6A3DA8859EDAAE9D546969AB683399031888307D3F52909DCFEB637CF719782D4F5E87D49A73D6D4B53DEF6FD98041B7A046686
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Nauru) {. {-9223372036854775808 40060 0 LMT}. {-1545131260 41400 0 +1130}. {-877347000 32400 0 +09}. {-800960400 41400 0 +1130}. {294323400 43200 0 +12}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):209
                                                                                      Entropy (8bit):4.680590339435768
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5Jm3Lm2OHJPm60jdFBJNsYv8FyGv7Kn:MBp5JmbmdHJPB0mYRGDKn
                                                                                      MD5:54FD41634DDEAA58F9F9770DC82B3E5F
                                                                                      SHA1:E5296ACE7239C4CD7E13D391676F910376556ACC
                                                                                      SHA-256:9D4E202A1ED8609194A97ED0F58B3C36DF83F46AE92EAF09F8337317DCACA75F
                                                                                      SHA-512:9A2192C1232368FA5D382062A2C48869155B727C970F5D5BCD5FE424FC9D15417394E637D77FCA793B633517A1BFED8D93E74F239A3BC1A6716615B6D877ADC6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Niue) {. {-9223372036854775808 -40780 0 LMT}. {-2177412020 -40800 0 -1120}. {-599575200 -41400 0 -1130}. {276089400 -39600 0 -11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):269
                                                                                      Entropy (8bit):4.580350938236725
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5JJpkLm2OH6uToePmUOvJiQHSJE8Gy+xS7zzv:MBp5JJAmdH6SPIvVH787+xkv
                                                                                      MD5:147E5FF4670F8551895B7B0EC1A66D46
                                                                                      SHA1:83F0D4DC817ED61E7985CC7AB3268B3EBAD657A3
                                                                                      SHA-256:A56472811F35D70F95E74A7366297BFAAFBC034CD10E9C0F3C59EFFA21A74223
                                                                                      SHA-512:FE183CA00E7D2B79F8E81E1FAF5E8CE103E430B7159C14CA915FD2BFE6D4381BF42EDB217E9D99C13D728CD09BB0E67562E84D957E9606F6B6C1AB08657DDBF9
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Norfolk) {. {-9223372036854775808 40312 0 LMT}. {-2177493112 40320 0 +1112}. {-599656320 41400 0 +1130}. {152029800 45000 1 +1230}. {162912600 41400 0 +1130}. {1443882600 39600 0 +11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):314
                                                                                      Entropy (8bit):4.468119357525684
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9X5JcdJm2OHTYAfIX2pVzOa9FxpZPS62pm+v:MBp5JcLmdHTYJX2fzFjb123v
                                                                                      MD5:A966877A1BEBFE5125460233A5C26728
                                                                                      SHA1:721103E2BFC0991CE80708D77C3FBEDCC2B3C9D3
                                                                                      SHA-256:8C282AC6DA722858D8B1755C710BE3EC4BD8EFEF4832A415E772EED287899315
                                                                                      SHA-512:51B5BD7834D4B3BAEEF3E1A2E6F469F6FFC354407182CA87AF67C4F4F26D4CB116A60BBB08BC178950CA3CFF978E2809EFC73002A4F8883B454024A2FFCBD732
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Noumea) {. {-9223372036854775808 39948 0 LMT}. {-1829387148 39600 0 +11}. {250002000 43200 1 +11}. {257342400 39600 0 +11}. {281451600 43200 1 +11}. {288878400 39600 0 +11}. {849366000 43200 1 +11}. {857228400 39600 0 +11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.94008377236012
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHurKeTFwSXGm2OH2ivkevXUPi1TsYvUdfWTVvvL:SlSWB9X5XevJm2OH23ePWieYCWZvvL
                                                                                      MD5:7ABD13E51C01A85468F6511B6710E4B5
                                                                                      SHA1:9DC80A7BFD7028DB672A20EF32C31B11F083BA99
                                                                                      SHA-256:AEE9D8FBCB7413536DA1CBDC4F28B7863B3DDD5E6A5AB2A90CE32038AC0EA2B8
                                                                                      SHA-512:6F6BBEBB10FD6B3987D3076D93DC06F5F765FAC22A90C4184AAF33C1FFD4CBD98464C8A0B4C0C38808AA6D08F91F5060BCEC83E278B8BEF21124C7FE427A09AF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Pago_Pago) {. {-9223372036854775808 45432 0 LMT}. {-2445424632 -40968 0 LMT}. {-1861879032 -39600 0 SST}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):145
                                                                                      Entropy (8bit):4.920441332270432
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHugEZFwcXGm2OHCAnvXmdQ4+vScCC:SlSWB9X5Xg2wTm2OHPnPmdQRvScCC
                                                                                      MD5:4070C7A615EF7977537641B01FA46AD6
                                                                                      SHA1:E80FF2BBD448B2399DBE56D279858D7D06EBA691
                                                                                      SHA-256:F12CB444E9BA91385BED20E60E7DF1A0DB0CE76C6FC7ACA59EEF029BC56D5EA3
                                                                                      SHA-512:5DD3FD1D0AA4D6DA3F274BEEC283A72B4532804AA9901AB4B1616D36C13CB8F5CC51DB8A6B89C019FAD875ABB567EFC8BD894AADC1E63E94A8CAC79F3E82CB6C
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Palau) {. {-9223372036854775808 32276 0 LMT}. {-2177485076 32400 0 +09}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.757588870650609
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHuQTWLMWkXGm2OHUVFvvXmXUlgloRNycyf/vGRvn:SlSWB9X5XQyLMCm2OHUVVPmXUKmOhf/+
                                                                                      MD5:AB8D0D9514FA6C5E995AE76D2DAEA6D4
                                                                                      SHA1:3775349B3BE806AA005174D91597D6F2C54E8EC5
                                                                                      SHA-256:3BB856B2C966211D7689CD303DFDDACB3C323F3C2DA0FF47148A8C5B7BC0E1C4
                                                                                      SHA-512:AB5D2E00C820D36A2A8B198AAC9350BEFA235EA848A11B16B042EE8124975DCAFC737D30D7C1A01D874B0937E469C2364441FCA686B5EB66A48251F587F55DC5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Pitcairn) {. {-9223372036854775808 -31220 0 LMT}. {-2177421580 -30600 0 -0830}. {893665800 -28800 0 -08}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):147
                                                                                      Entropy (8bit):4.9618148014469705
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHuy3EXGm2OH1/VvXmcrLmv:SlSWB9X5Xybm2OH1NPmSqv
                                                                                      MD5:0D8489972CBD248971C83DA074C79030
                                                                                      SHA1:3E390EDC1A2F678918220026F03E914BB6E8ED4B
                                                                                      SHA-256:A85364C6E79EA16FD0C86A5CF74CCB84843009A6738AAED3B13A709F1BDF0DF7
                                                                                      SHA-512:A43E459BAB47F133E27A67CFA448E94FBE796DDC23A2D6C3400437D3BC8F31AC2EF3541C4588CF494E1BBD55856C5FA8553A6CD92534E2243EFA31BE2BF5A4CC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Pohnpei) {. {-9223372036854775808 37972 0 LMT}. {-2177490772 39600 0 +11}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):183
                                                                                      Entropy (8bit):4.735143778298082
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQGuySedVAIgObTuyvQnUDHu3HppUDHuyu:SlSWB9IZaM3yciySedVAIgObiyvQX3HP
                                                                                      MD5:C963ECC06914E8E42F0B96504C1F041C
                                                                                      SHA1:82D256793B22E9C07362708EE262A6B46AC13ACD
                                                                                      SHA-256:86593D3A9DC648370A658D82DA7C410E26D818DB2749B79F57A802F8CED76BD3
                                                                                      SHA-512:0F3691977F992A3FF281AD1577BA0BD4AAF7DB3F167E1A1FF139374C14B14F1A456BE7E7D362D698A8294A6AB906E69AC56E1EE0DAF77C13050553299FB6DAF5
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pohnpei)]} {. LoadTimeZoneFile Pacific/Pohnpei.}.set TZData(:Pacific/Ponape) $TZData(:Pacific/Pohnpei).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):183
                                                                                      Entropy (8bit):4.8981931494123065
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHuwKXI3EXGm2OHwdvvXZUeQTnoowFZnqMVVMUJv:SlSWB9X5X/43Lm2OHwdvPZZQTnoDZDVN
                                                                                      MD5:AF14EE836FE5D358C83568C5ACFA88C0
                                                                                      SHA1:22026C7FE440E466193E6B6935C2047BD321F76B
                                                                                      SHA-256:33E0A5DD919E02B7311A35E24DB37F86A20A394A195FE01F5A3BE7336F276665
                                                                                      SHA-512:BEF151E1198D57328BA0FC01BB6F00AD51ADEEE99A97C30E0D08FFB3CFCB9E99B34DBAD03FCB3B19F17D60590FA0E6C5F2978954A3585CDFD31E32C93B05154D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Port_Moresby) {. {-9223372036854775808 35320 0 LMT}. {-2840176120 35312 0 PMMT}. {-2366790512 36000 0 +10}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):907
                                                                                      Entropy (8bit):3.848488423299009
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:ccekzUF0tMUObNFnNUYWJYu+nkonSAOaJT/rbkoa5SBnLn:1zUuMUOnNUVJYxkonSAOaJTjbkoasRLn
                                                                                      MD5:19F22E22F7B136EFCB45E83BC765E871
                                                                                      SHA1:500CC7EA47902856727C2B6D23BF4DAFF6817EB4
                                                                                      SHA-256:B1235ED60A50282E14F4B2B477F9936D15CAF91495CBB81971A2C9580209C420
                                                                                      SHA-512:2FD667F105E57A62821B2BB301A1A31BB56FA6670AADC94F41337445335262FE40DA5DAE7113328E54379E45246B5419B94F8C8AFB73B1F2405E7F08F5D6FBCC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Rarotonga) {. {-9223372036854775808 -38344 0 LMT}. {-2177414456 -37800 0 -1030}. {279714600 -34200 0 -10}. {289387800 -36000 0 -10}. {309952800 -34200 1 -10}. {320837400 -36000 0 -10}. {341402400 -34200 1 -10}. {352287000 -36000 0 -10}. {372852000 -34200 1 -10}. {384341400 -36000 0 -10}. {404906400 -34200 1 -10}. {415791000 -36000 0 -10}. {436356000 -34200 1 -10}. {447240600 -36000 0 -10}. {467805600 -34200 1 -10}. {478690200 -36000 0 -10}. {499255200 -34200 1 -10}. {510139800 -36000 0 -10}. {530704800 -34200 1 -10}. {541589400 -36000 0 -10}. {562154400 -34200 1 -10}. {573643800 -36000 0 -10}. {594208800 -34200 1 -10}. {605093400 -36000 0 -10}. {625658400 -34200 1 -10}. {636543000 -36000 0 -10}. {657108000 -34200 1 -10}. {667992600 -36000 0 -10}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):174
                                                                                      Entropy (8bit):4.8048918219164065
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG5RFedVAIgObT5RSQnUDHtluKpUDH5Rp:SlSWB9IZaM3ycdedVAIgObaQvKM
                                                                                      MD5:BE50B3EE2BD083842CFFB7698DD04CDE
                                                                                      SHA1:0B8C8AFC5F94E33226F148202EFFBD0787D61FA2
                                                                                      SHA-256:74DD6FE03E3061CE301FF3E8E309CF1B10FC0216EEC52839D48B210BCBD8CF63
                                                                                      SHA-512:136BCF692251B67CD3E6922AD0A200F0807018DC191CAE853F2192FD385F8150D5CCF36DF641ED9C09701E4DBBB105BF97C7540D7FA9D9FFC440682B770DF5BA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Guam)]} {. LoadTimeZoneFile Pacific/Guam.}.set TZData(:Pacific/Saipan) $TZData(:Pacific/Guam).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):188
                                                                                      Entropy (8bit):4.729839728044672
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQGurKeTIVAIgObTurKeUAtnUDHthA5nUDHurKeTv:SlSWB9IZaM3ycieZVAIgObieiNXeg
                                                                                      MD5:843BBE96C9590D69B09FD885B68DE65A
                                                                                      SHA1:25BF176717A4578447E1D77F9BF0140AFF18625A
                                                                                      SHA-256:4F031CB2C27A3E311CA4450C20FB5CF4211A168C39591AB02EEEC80A5A8BFB93
                                                                                      SHA-512:B50301CFC8E5CF8C257728999B0D91C06E2F7C040D30F71B90BBC612959B519E8D27EE2DA9B8B9002483D3F4F173BB341A07898B4E4C98A146B3D988CA3BD5B2
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pago_Pago)]} {. LoadTimeZoneFile Pacific/Pago_Pago.}.set TZData(:Pacific/Samoa) $TZData(:Pacific/Pago_Pago).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):148
                                                                                      Entropy (8bit):4.900317309402027
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHqhFtXGm2OHl/oevUdNqRU8Cn:SlSWB9X5TTEm2OHloeYqRQn
                                                                                      MD5:DDF599B7659B88603DF80E390471CB10
                                                                                      SHA1:80FF5E0E99483CB8952EC137A261D034B6759D07
                                                                                      SHA-256:B8282EC1E5BFA5E116C7DC5DC974B0605C85D423519F124754126E8F8FE439EC
                                                                                      SHA-512:28F15CB6310190066936B7B21024205EC87A54D081415B1E46E72982814E1E2A41A2CE8B808D02E705100CE5ACBB1E69F1859E40A04F629B7004FBD89DD37899
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Tahiti) {. {-9223372036854775808 -35896 0 LMT}. {-1806674504 -36000 0 -10}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):146
                                                                                      Entropy (8bit):4.924466748251822
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHqQwcXGm2OHyyFpoevXmciRrWFN0UIvYv:SlSWB9X5TbTm2OHyyFGePmbu0a
                                                                                      MD5:AE5E0FFFEEFD0A8E77233CB0E59DE352
                                                                                      SHA1:7B7CC1095FB919946F3315C4A28994AEB1ECD51A
                                                                                      SHA-256:1FCC6C0CC48538EDB5B8290465156B2D919DFA487C740EB85A1DF472C460B0E6
                                                                                      SHA-512:1693FA5DE78FDCF79993CB137EE0568A4B8245D0177DF845356B3C2418641C8AA23CAA7069707C0E180FF9F5345D380A3575EEFFE0C8BC08E18E40ED0E1F6FA3
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Tarawa) {. {-9223372036854775808 41524 0 LMT}. {-2177494324 43200 0 +12}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):436
                                                                                      Entropy (8bit):4.271209640478309
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:MBp5kJmdHmLP72Dcw8UtnKbUtrtAUt54bUtjg:cOem77il2eQ
                                                                                      MD5:C32CDBF9C696134870351ABB80920E08
                                                                                      SHA1:43918B7BF46EF2B574D684D36901592E43A45A8A
                                                                                      SHA-256:8FE5EF266C660C4A25827BE9C2C4081A206D946DD46EBC1095F8D18F41536399
                                                                                      SHA-512:1E10C548659A9CE0A9F0C7E6FD86EAD8627C07A8C9842933E7C6CD28EACDE3735DBFDCF7DD1DE5DDE7F2F102F7D584B3C44B1350AFDF7E1621FE9F565CD32362
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Tongatapu) {. {-9223372036854775808 44360 0 LMT}. {-2177497160 44400 0 +1220}. {-915193200 46800 0 +13}. {915102000 46800 0 +13}. {939214800 50400 1 +13}. {953384400 46800 0 +13}. {973342800 50400 1 +13}. {980596800 46800 0 +13}. {1004792400 50400 1 +13}. {1012046400 46800 0 +13}. {1478350800 50400 1 +13}. {1484398800 46800 0 +13}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):175
                                                                                      Entropy (8bit):4.865414495402954
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG9CovedVAIgObT9CknUDHqAOsvUDH9Cov:SlSWB9IZaM3yckGedVAIgObkkTAOmy
                                                                                      MD5:3282C08FE7BC3A5F4585E97906904AE1
                                                                                      SHA1:09497114D1EC149FB5CF167CBB4BE2B5E7FFA982
                                                                                      SHA-256:DC6263DCC96F0EB1B6709693B9455CB229C8601A9A0B96A4594A03AF42515633
                                                                                      SHA-512:077924E93AC9F610CD9FE158655B631186198BD96995428EB9EE2082449BD36CBF6C214D86E51A6D9A83329FCD5E931C343AA14DBB286C53071D46692B81BC0D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Chuuk)]} {. LoadTimeZoneFile Pacific/Chuuk.}.set TZData(:Pacific/Truk) $TZData(:Pacific/Chuuk).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):144
                                                                                      Entropy (8bit):4.9366125478034935
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHp8FkXGm2OH4VkxYvXmcDVv0UIvYv:SlSWB9X5PJm2OHYkxYPmyv0a
                                                                                      MD5:AD4044C0F87566AA5265DA84CD3DABBA
                                                                                      SHA1:15ED1B5960B3E70B23C430B0281B108506BBE76C
                                                                                      SHA-256:2C273BA8F8324E1B414B40DC356C78E0FD3C02D5E8158EA5753CA51E1185FC11
                                                                                      SHA-512:AD4758B01038BCAA519776226B43D90CED89292BA47988F639D45FD5B5436ED4E3B16C27F9145EC973DCC242FF6ADC514D7CDD6660E7CE8DD8E92A96CDACD947
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Wake) {. {-9223372036854775808 39988 0 LMT}. {-2177492788 43200 0 +12}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):146
                                                                                      Entropy (8bit):4.932023172694197
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFx5nUDHpEf/kXGm2OH3UPvXmcCRQH0UIvYv:SlSWB9X5tfTm2OHkPPmiH0a
                                                                                      MD5:9FBFA7A7556A081F2352250B44EB0CB6
                                                                                      SHA1:CB16A38A9E51FEFC803C4E119395B9BCDBA1CF95
                                                                                      SHA-256:29ABBA5D792FB1D754347DED8E17423D12E07231015D5A65A5873BFC0CE474C7
                                                                                      SHA-512:CD0FA19597D7188F1D05E8FE9DD9B650DDD30CBBEF3F16646715D5DEF5A261C1E92ADE781DEA609B163808D7A59A0F7AF168332D0134D87DADE42447ABE7E431
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:Pacific/Wallis) {. {-9223372036854775808 44120 0 LMT}. {-2177496920 43200 0 +12}.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):174
                                                                                      Entropy (8bit):4.887747451136248
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG9CovedVAIgObT9CknUDHnHPUDH9Cov:SlSWB9IZaM3yckGedVAIgObkkeBy
                                                                                      MD5:63594F45385660A04D21C11B5F203FF4
                                                                                      SHA1:CEEC55B952B8EBA952E0965D92220C8EF001E59E
                                                                                      SHA-256:4418559478B5881DFAF3FE3246A4BFE2E62C46C1D3D452EE4CF5D9651C4F92B5
                                                                                      SHA-512:B9B55B027EFB7E87D44E89191C03A8409A16FA19A52032E29210161AE8FED528A6504B7B487181847125AF2C7C129A0687323CDDC6D5454199229897F97F0AB0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Chuuk)]} {. LoadTimeZoneFile Pacific/Chuuk.}.set TZData(:Pacific/Yap) $TZData(:Pacific/Chuuk).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):169
                                                                                      Entropy (8bit):4.89278153269951
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVqEGIVyVAIgoqpEGuHtnSi67x/yQa0EGIv:SlSWB9IZaM3ymczVAIgocuN27x6qS
                                                                                      MD5:975F22C426CE931547D50A239259609A
                                                                                      SHA1:77D68DF6203E3A2C1A2ADD6B6F8E573EF849AE2E
                                                                                      SHA-256:309DE0FBCCDAE21114322BD4BE5A8D1375CD95F5FC5A998B3F743E904DC1A131
                                                                                      SHA-512:ABDF01FCD0D34B5A8E97C604F3976E199773886E87A13B3CDD2319A92BD34D76533D4BA41978F8AAA134D200B6E87F26CB8C223C2760A4D7A78CD7D889DB79BE
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Warsaw)]} {. LoadTimeZoneFile Europe/Warsaw.}.set TZData(:Poland) $TZData(:Europe/Warsaw).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):171
                                                                                      Entropy (8bit):4.887895128079745
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVxMvLSwFVAIgoqyMvLN6nM24h8QavMvLu:SlSWB9IZaM3ymvMv2wFVAIgovMvUe81B
                                                                                      MD5:31202B87B7352110A03D740D66DCD967
                                                                                      SHA1:439A3700721D4304FA81282E70F6305BB3706C8D
                                                                                      SHA-256:8288E9E5FC25549D6240021BFB569ED8EB07FF8610AAA2D39CD45A025EBD2853
                                                                                      SHA-512:AB95D3990DC99F6A06BF3384D98D42481E198B2C4D1B2C85E869A2F95B651DDF64406AB15C485698E24F26D1A081E22371CE74809915A7CCA02F2946FB8607BF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Lisbon)]} {. LoadTimeZoneFile Europe/Lisbon.}.set TZData(:Portugal) $TZData(:Europe/Lisbon).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):160
                                                                                      Entropy (8bit):4.743612967973961
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8qMvedVAIgNqBolOr4WFKfMv:SlSWB9IZaM3yKMvedVAIgcBoS4wKfMv
                                                                                      MD5:A0C5022166493D766E827B88F806CA32
                                                                                      SHA1:2A679A391C810122DDD6A7EF722C35328FC09D9C
                                                                                      SHA-256:537EA39AFBA7CFC059DE58D484EF450BEE73C7903D36F09A16CA983CB5B8F686
                                                                                      SHA-512:85FEF0A89087D2196EC817A6444F9D94A8D315A64EAE9615C615DBB79B30320CED0D49A1A6C2CD566C722971FA8908A675B1C8F7E64D6875505C60400219F938
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Taipei)]} {. LoadTimeZoneFile Asia/Taipei.}.set TZData(:ROC) $TZData(:Asia/Taipei).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):157
                                                                                      Entropy (8bit):4.851755466867201
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq8ZQckvFVAIgNtvQstlmFeWFKKQs:SlSWB9IZaM3yJmFVAIgztpwKg
                                                                                      MD5:48E7BE02E802A47C0D2F87E633010F38
                                                                                      SHA1:A547853A7ED03CE9C07FC3BAA0F57F5ABB4B636B
                                                                                      SHA-256:2F362169FD628D6E0CB32507F69AD64177BC812E7E961E5A738F4F492B105128
                                                                                      SHA-512:BCBE9BC1C08CFF97B09F8D566EC3B42B9CE8442FA4BECE37A18446CBBF0ECEDA66BA18ABFA5E52E7677B18FB5DABF00DF9E28DE17B094A690B097AFC7130EA89
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Seoul)]} {. LoadTimeZoneFile Asia/Seoul.}.set TZData(:ROK) $TZData(:Asia/Seoul).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):175
                                                                                      Entropy (8bit):4.80663340464643
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyq801cwFVAIgNtK1ERLkZ8O5h4WFKf1E:SlSWB9IZaM3yUpFVAIgWWLkth4wKfK
                                                                                      MD5:9E2902F20F33CA25B142B6AA51D4D54F
                                                                                      SHA1:C1933081F30ABB7780646576D7D0F54DC6F1BC51
                                                                                      SHA-256:FCF394D598EC397E1FFEED5282874408D75A9C3FFB260C55EF00F30A80935CA4
                                                                                      SHA-512:D56AF44C4E4D5D3E6FC31D56B9BA36BD8499683D1A3C9BC48EEE392C4AC5ACAA10E3E82282F5BDA9586AF26F4B6C0C5649C454399144F040CC94EA35BBB53B48
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Asia/Singapore)]} {. LoadTimeZoneFile Asia/Singapore.}.set TZData(:Singapore) $TZData(:Asia/Singapore).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):196
                                                                                      Entropy (8bit):4.951561086936219
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSNJB9IZaM3y7p5oedVAIgppKNkjx+90pu:JBaIMYYpgN8+90M
                                                                                      MD5:A1D42EC950DE9178058EAA95CCFBAA09
                                                                                      SHA1:55BE1FAF85F0D5D5604685F9AC19286142FC7133
                                                                                      SHA-256:888A93210241F6639FB9A1DB0519407047CB7F5955F0D5382F2A85C0C473D9A5
                                                                                      SHA-512:3C6033D1C84B75871B8E37E71BFEE26549900C555D03F8EC20A31076319E2FEBB0240EC075C2CAFC948D629A32023281166A7C69AFEA3586DEE7A2F585CB5E82
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Puerto_Rico)]} {. LoadTimeZoneFile America/Puerto_Rico.}.set TZData(:SystemV/AST4) $TZData(:America/Puerto_Rico).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):187
                                                                                      Entropy (8bit):4.900537547414888
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx02NEO4FVAIg202NEtYFkRDwh4IAcGE2NEOv:SlSNJB9IZaM3y7UEO4FVAIgpUEqFk+4b
                                                                                      MD5:CFDB782F87A616B89203623B9D6E3DBF
                                                                                      SHA1:1BB9F75215A172B25D3AE27AAAD6F1D74F837FE6
                                                                                      SHA-256:62C72CF0A80A5821663EC5923B3F17C12CE5D6BE1E449874744463BF64BCC3D7
                                                                                      SHA-512:085E5B6E81E65BC781B5BC635C6FA1E7BF5DC69295CF739C739F6361BF9EB67F36F7124A2D3E5ADA5F854149C84B9C8A7FB22E5C6E8FF57576EBDEA0E4D6560B
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Halifax)]} {. LoadTimeZoneFile America/Halifax.}.set TZData(:SystemV/AST4ADT) $TZData(:America/Halifax).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.911352504536709
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx0sAzE5YyVAIg20sAzEvYvW6kR/eIAcGEsAzEun:SlSNJB9IZaM3y7hzipVAIgphzGCW6kcQ
                                                                                      MD5:01215B5D234C433552A3BF0A440B38F6
                                                                                      SHA1:B3A469977D38E1156B81A93D90E638693CFDBEEF
                                                                                      SHA-256:2199E7DD20502C4AF25D57A58B11B16BA3173DB47EFA7AD2B33FDB72793C4DDB
                                                                                      SHA-512:35D3BDE235FF40C563C7CEDD8A2CCBB4BAC2E2AA24A8E072EA0572BB231295D705EA9F84EEAA9FD2C735B1203332D8D97C3592A2B702BCFE9C81828D4F635205
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Regina)]} {. LoadTimeZoneFile America/Regina.}.set TZData(:SystemV/CST6) $TZData(:America/Regina).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):187
                                                                                      Entropy (8bit):4.929669998131187
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx096dVAIg2096zAtkRwx/h4IAcGE96s:SlSNJB9IZaM3y796dVAIgp96Wkyxp49c
                                                                                      MD5:CDE40B5897D89E19A3F2241912B96826
                                                                                      SHA1:00DE53DC7AA97F26B1A8BF83315635FBF634ABB3
                                                                                      SHA-256:3C83D3DB23862D9CA221109975B414555809C27D45D1ED8B9456919F8BA3BF25
                                                                                      SHA-512:69DFC06ACF544B7F95DEF2928C1DFE4D95FAD48EE753AD994921E1967F27A3AF891A9F31DDEA547E1BED81C5D2ECF5FC93E75019F2327DE1E73A009422BE52EC
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Chicago)]} {. LoadTimeZoneFile America/Chicago.}.set TZData(:SystemV/CST6CDT) $TZData(:America/Chicago).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):199
                                                                                      Entropy (8bit):4.881715127736134
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSNJB9IZaM3y73G7mFVAIgp3GBLkkp4903G1:JBaIMY3G7Hp3GBLVp4903G1
                                                                                      MD5:87FEA19F6D7D08F44F93870F7CBBD456
                                                                                      SHA1:EB768ECB0B1B119560D2ACBB10017A8B3DC77FDD
                                                                                      SHA-256:2B5887460D6FB393DED5273D1AA87A6A9E1F9E7196A8FA11B4DEB31FAD8922C8
                                                                                      SHA-512:00DA47594E80D2DB6F2BE6E482A1140780B71F8BBE966987821249984627C5D8C31AA1F2F6251B4D5084C33C66C007A47AFF4F379FA5DA4A112BA028B982A85A
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indianapolis)]} {. LoadTimeZoneFile America/Indianapolis.}.set TZData(:SystemV/EST5) $TZData(:America/Indianapolis).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):190
                                                                                      Entropy (8bit):5.071686349792137
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx0wAy0vwVAIg20wAyatkR5ghxEH/h4IAcGEwAy0v:SlSNJB9IZaM3y71KVAIgp1Bkrp4901h
                                                                                      MD5:5C43C828D9460B9DF370F0D155B03A5C
                                                                                      SHA1:92F92CD64937703D4829C42FE5656C7CCBA22F4E
                                                                                      SHA-256:3F833E2C2E03EF1C3CC9E37B92DBFBA429E73449E288BEBE19302E23EB07C78B
                                                                                      SHA-512:A88EAA9DAAD9AC622B75BC6C89EB44A2E4855261A2F7077D8D4018F00FC82E5E1EA364E3D1C08754701A545F5EC74752B9F3657BF589CF76E5A3931F81E99BBF
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/New_York)]} {. LoadTimeZoneFile America/New_York.}.set TZData(:SystemV/EST5EDT) $TZData(:America/New_York).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):188
                                                                                      Entropy (8bit):4.927529755640769
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqTQG2fWGYFedVAIgObT2fWzvNkRSm1hpUDH2fWRn:SlSNJB9IZaM3yc6e8dVAIgOb6ezvNkQN
                                                                                      MD5:1A50997B6F22E36D2E1849D1D95D0882
                                                                                      SHA1:F4AC3ABBEA4A67013F4DC52A04616152C4C639A9
                                                                                      SHA-256:C94C64BF06FDE0A88F24C435A52BDDE0C5C70F383CD09C62D7E42EAB2C54DD2C
                                                                                      SHA-512:CCBD66449983844B3DB440442892004D070E5F0DFF454B25C681E13EB2F25F6359D0221CE5FF7800AC794A32D4474FE1126EA2465DB83707FF7496A1B39E6E1A
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Honolulu)]} {. LoadTimeZoneFile Pacific/Honolulu.}.set TZData(:SystemV/HST10) $TZData(:Pacific/Honolulu).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.953801751537501
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx0utLaDvFVAIg20utLPtkRgFfh4IAcGEutLNn:SlSNJB9IZaM3y7O+FVAIgpObtkch490u
                                                                                      MD5:2B415F2251BE08F1035962CE2A04149F
                                                                                      SHA1:EFF5CE7CD0A0CBCF366AC531D168CCB2B7C46734
                                                                                      SHA-256:569819420F44D127693C6E536CAC77410D751A331268D0C059A1898C0E219CF4
                                                                                      SHA-512:971F1763558D8AC17753C01B7BB64E947C448AA29951064ED7C5997D4B4A652C7F5D7C2CB4F8040F73AD83D7E49B491B93047A06D8C699F33B08F4A064BE0DCC
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Phoenix)]} {. LoadTimeZoneFile America/Phoenix.}.set TZData(:SystemV/MST7) $TZData(:America/Phoenix).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.909831110037175
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqx06RGFwVAIg206RAO0LkRMMFfh4IAcGE6Ru:SlSNJB9IZaM3y7+SwVAIgp+iLkD490+u
                                                                                      MD5:895E9BAF5EDF0928D4962C3E6650D843
                                                                                      SHA1:52513BFA267CA2E84FDDF3C252A4E8FD059F2847
                                                                                      SHA-256:465A4DE93F2B103981A54827CDEBB10350A385515BB8648D493FD376AABD40AF
                                                                                      SHA-512:CAF19320F0F507160E024C37E26987A99F2276622F2A6D8D1B7E3068E5459960840F4202FF8A98738B9BCA0F42451304FC136CBD36BBFE39F616622217AD89A3
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Denver)]} {. LoadTimeZoneFile America/Denver.}.set TZData(:SystemV/MST7MDT) $TZData(:America/Denver).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):187
                                                                                      Entropy (8bit):4.782387645904801
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqTQGuQTWLM4YkvFVAIgObTuQTWLvqtkRQB5nUDHuQTWi:SlSNJB9IZaM3yciQyLM4YmFVAIgObiQq
                                                                                      MD5:67AE3FD76B2202F3B1CF0BBC664DE8D0
                                                                                      SHA1:4603DE0753B684A8D7ACB78A6164D5686542EE8E
                                                                                      SHA-256:30B3FC95A7CB0A6AC586BADF47E9EFA4498995C58B80A03DA2F1F3E8A2F3553B
                                                                                      SHA-512:BF45D0CA674DD631D3E8442DFB333812B5B31DE61576B8BE33B94E0433936BC1CD568D9FC522C84551E770660BE2A98F45FE3DB4B6577968DF57071795B53AD9
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pitcairn)]} {. LoadTimeZoneFile Pacific/Pitcairn.}.set TZData(:SystemV/PST8) $TZData(:Pacific/Pitcairn).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):199
                                                                                      Entropy (8bit):4.959254419324467
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSNJB9IZaM3y7DvwFVAIgpdJLkQ1p490Dvn:JBaIMYFpdJLh090z
                                                                                      MD5:DFB48E0E2CE5D55DC60B3E95B7D12813
                                                                                      SHA1:535E0BF050E41DCFCE08686AFDFAFF9AAFEF220C
                                                                                      SHA-256:74096A41C38F6E0641934C84563277EBA33C5159C7C564C7FF316D050083DD6D
                                                                                      SHA-512:3ECDF3950ED3FB3123D6C1389A2A877842B90F677873A0C106C4CA6B180EEC38A26C74E21E8A3036DA8980FF7CA9E1578B0E1D1A3EA364A4175772F468747425
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Los_Angeles)]} {. LoadTimeZoneFile America/Los_Angeles.}.set TZData(:SystemV/PST8PDT) $TZData(:America/Los_Angeles).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.905971098884841
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFLLJJT8QFCZaMuUyqTQG5hB5pVAIgObT5hBiLkRKlUDH5hBun:SlSNJB9IZaM3ycTpVAIgOb4LkK
                                                                                      MD5:CED0A343EF3A316902A10467B2F66B9B
                                                                                      SHA1:5884E6BA28FD71A944CA2ED9CB118B9E108EF7CB
                                                                                      SHA-256:1BB5A98B80989539135EAB3885BBA20B1E113C19CB664FB2DA6B150DD1F44F68
                                                                                      SHA-512:903D1DC6D1E192D4A98B84247037AE171804D250BB5CB84D2C5E145A0BDC50FCD543B70BAFF8440AFF59DA14084C8CEEFB2F912A02B36B7571B0EEEC154983B3
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Gambier)]} {. LoadTimeZoneFile Pacific/Gambier.}.set TZData(:SystemV/YST9) $TZData(:Pacific/Gambier).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):193
                                                                                      Entropy (8bit):4.949109665596263
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSNJB9IZaM3y7/9EtDvFVAIgp/9EmLkB490/9E6:JBaIMY/944p/9xLN90/9F
                                                                                      MD5:D588930E34CF0A03EFEE7BFBC5022BC3
                                                                                      SHA1:0714C6ECAAF7B4D23272443E5E401CE141735E78
                                                                                      SHA-256:4D1CAE3C453090667549AB83A8DE6F9B654AAC5F540192886E5756A01D21A253
                                                                                      SHA-512:ABE69BEF808D7B0BEF9F49804D4A753E033D7C99A7EA57745FE4C3CBE2C26114A8845A219ED6DEAB8FA009FDB86E384687068C1BCF8B704CCF24DA7029455802
                                                                                      Malicious:false
                                                                                      Preview:# created by ../tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Anchorage)]} {. LoadTimeZoneFile America/Anchorage.}.set TZData(:SystemV/YST9YDT) $TZData(:America/Anchorage).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):175
                                                                                      Entropy (8bit):4.882090609090058
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxV0XaDvFVAIgoq3XPHtjCl1yQaqXNn:SlSWB9IZaM3ymQazFVAIgoQPHtSymN
                                                                                      MD5:41703ED241199F0588E1FC6FF0F33E90
                                                                                      SHA1:08B4785E21E21DFE333766A7198C325CD062347B
                                                                                      SHA-256:4B8A8CE69EE94D7E1D49A2E00E2944675B66BD16302FE90E9020845767B0509B
                                                                                      SHA-512:F90F6B0002274AF57B2749262E1530E21906162E4D1F3BE89639B5449269F3026A7F710C24765E913BC23DEC5A6BF97FC0DD465972892D851B6EAEEF025846CA
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Istanbul)]} {. LoadTimeZoneFile Europe/Istanbul.}.set TZData(:Turkey) $TZData(:Europe/Istanbul).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):148
                                                                                      Entropy (8bit):4.792993822845485
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAmMwFVAIghO6iGMFfh8RS:SlSWB9IZaM3y1wFVAIghFiP8RS
                                                                                      MD5:1921CC58408AD2D7ED3B5308C71B1A28
                                                                                      SHA1:12F832D7B3682DC28A49481B8FBA8C55DCDC60D0
                                                                                      SHA-256:92FC6E3AA418F94C486CE5BF6861FAA4E85047189E98B90DA78D814810E88CE7
                                                                                      SHA-512:EB134E2E7F7A811BFA8223EB4E98A94905EA24891FD95AB29B52DE2F683C97E086AA2F7B2EA93FBA2451AAEDD22F01219D700812DABC7D6670028ACF9AAB8367
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UCT)]} {. LoadTimeZoneFile Etc/UCT.}.set TZData(:UCT) $TZData(:Etc/UCT).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):184
                                                                                      Entropy (8bit):4.864166947846424
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0/VXEtDvFVAIg20/VXE0JLiOGl0IAcGE/VXE6n:SlSWB9IZaM3y7/9EtDvFVAIgp/9EmLiB
                                                                                      MD5:0763082FF8721616592350D8372D59FF
                                                                                      SHA1:CEBB03EB7F44530CF52DCA7D55DC912015604D94
                                                                                      SHA-256:94FDFE2901596FC5DCE74A5560431F3E777AE1EBEEE59712393AE2323F17ADFA
                                                                                      SHA-512:DFE8AAA009C28C209A925BBE5509589C0087F6CC78F94763BFA9F1F311427E3FF2E377EB340590383D790D3578C1BB37D41525408D027763EA96ECB3A3AAD65D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Anchorage)]} {. LoadTimeZoneFile America/Anchorage.}.set TZData(:US/Alaska) $TZData(:America/Anchorage).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):171
                                                                                      Entropy (8bit):4.839824852896375
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0/yO5pVAIg20/yOvYvtiObMEIB/4IAcGE/yOun:SlSWB9IZaM3y7/ykVAIgp/y9FitE8/47
                                                                                      MD5:01142938A2E5F30FADE20294C829C116
                                                                                      SHA1:8F9317E0D3836AF916ED5530176C2BF7A929C3C7
                                                                                      SHA-256:1DD79263FB253217C36A9E7DDCB2B3F35F208E2CE812DCDE5FD924593472E4FE
                                                                                      SHA-512:2C47FE8E8ED0833F4724EF353A9A6DFCE3B6614DA744E64364E9AB423EC92565FEF1E8940CB12A0BCCFE0BD6B44583AF230A4ABCC0BAE3D9DC43FBB2C7941CFF
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Adak)]} {. LoadTimeZoneFile America/Adak.}.set TZData(:US/Aleutian) $TZData(:America/Adak).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.886225611026426
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0utLaDvFVAIg20utLPtiQMfQfBx+IAcGEutLNn:SlSWB9IZaM3y7O+FVAIgpObtiZfQfH+v
                                                                                      MD5:090DC30F7914D5A5B0033586F3158384
                                                                                      SHA1:2F526A63A1C47F88E320BE1C12CA8887DA2DC989
                                                                                      SHA-256:47D25266ABBD752D61903C903ED3E9CB485A7C01BD2AA354C5B50DEBC253E01A
                                                                                      SHA-512:5FE75328595B5DECDAC8D318BEE89EAD744A881898A4B45DD2ABB5344B13D8AFB180E4A8F8D098A9589488D9379B0153CBC5CF638AF7011DE89C57B554F42757
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Phoenix)]} {. LoadTimeZoneFile America/Phoenix.}.set TZData(:US/Arizona) $TZData(:America/Phoenix).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):179
                                                                                      Entropy (8bit):4.854450230853601
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx096dVAIg2096zAtibXgox/h4IAcGE96s:SlSWB9IZaM3y796dVAIgp96WiB49096s
                                                                                      MD5:E0801B5A57F40D42E8AF6D48C2A41467
                                                                                      SHA1:A49456A1BF1B73C6B284E0764AEAFD1464E70DDC
                                                                                      SHA-256:16C7FFCE60495E5B0CB65D6D5A0C3C5AA9E62BD6BC067ABD3CD0F691DA41C952
                                                                                      SHA-512:3DE6A41B88D6485FD1DED2DB9AB9DAD87B9F9F95AA929D38BF6498FC0FD76A1048CE1B68F24CD22C487073F59BD955AFCB9B7BF3B20090F81FA250A5E7674A53
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Chicago)]} {. LoadTimeZoneFile America/Chicago.}.set TZData(:US/Central) $TZData(:America/Chicago).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):223
                                                                                      Entropy (8bit):4.715837665658945
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y73GK7mFVAIgp3GKBLi3E0903GK1:MBaIMY3GK7Hp3GKBLi3t903GK1
                                                                                      MD5:1A27644D1BF2299B7CDDED7F405D6570
                                                                                      SHA1:BD03290A6E7A967152E2E4F95A82E01E7C35F63C
                                                                                      SHA-256:1C46FAEDFACEB862B2E4D5BD6AC63E5182E1E2CFD2E1CDFA2661D698CC8B0072
                                                                                      SHA-512:9D6F3E945656DD97A7E956886C1123B298A87704D4F5671E4D1E94531C01F8BE377D83239D8BE78E2B3E1C0C20E5779BA3978F817A6982FE607A18A7FDCF57FB
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Indianapolis)]} {. LoadTimeZoneFile America/Indiana/Indianapolis.}.set TZData(:US/East-Indiana) $TZData(:America/Indiana/Indianapolis).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):182
                                                                                      Entropy (8bit):4.990255962392122
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0wAy0vwVAIg20wAyati37oxp4IAcGEwAy0v:SlSWB9IZaM3y71KVAIgp1Bi37oxp490n
                                                                                      MD5:3FE03D768F8E535506D92A6BC3C03FD2
                                                                                      SHA1:F82BF149CE203B5A4A1E106A495D3409AF7A07AC
                                                                                      SHA-256:9F46C0E46F6FE26719E2CF1FA05C7646530B65FB17D4101258D357568C489D77
                                                                                      SHA-512:ADFDBB270113A192B2378CC347DD8A57FDBDC776B06F9E16033EE8D5EAB49E16234CA2523580EEBB4DCDD27F33222EDD5514F0D7D85723597F059C5D6131E1B0
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/New_York)]} {. LoadTimeZoneFile America/New_York.}.set TZData(:US/Eastern) $TZData(:America/New_York).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):181
                                                                                      Entropy (8bit):4.832149382727646
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQG2fWGYFedVAIgObT2fWzvNioMN75nUDH2fWRn:SlSWB9IZaM3yc6e8dVAIgOb6ezvNioEe
                                                                                      MD5:347E51049A05224D18F264D08F360CBB
                                                                                      SHA1:A801725A9B01B5E08C63BD2568C8F5D084F0EB02
                                                                                      SHA-256:EA5D18E4A7505406D6027AD34395297BCF5E3290283C7CC28B4A34DB8AFBDD97
                                                                                      SHA-512:C9B96C005D90DD8F317A697F59393D20663DE74D6E4D0B45BCE109B31A328D7AA62C51FAA8D00C728C0342940EF3B0F0921814B31BD7FE128A6E95F92CF50E06
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Honolulu)]} {. LoadTimeZoneFile Pacific/Honolulu.}.set TZData(:US/Hawaii) $TZData(:Pacific/Honolulu).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):201
                                                                                      Entropy (8bit):4.825742972037525
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y73GKXFVAIgp3GK4NiGIfh4903GKk:MBaIMY3GKXQp3GKeiBfh4903GKk
                                                                                      MD5:E111813F4C9B888427B8363949C87C72
                                                                                      SHA1:96B6692DCD932DCC856804BE0C2145538C4B2B33
                                                                                      SHA-256:4E896634F3A400786BBD996D1FE0D5C9A346E337027B240F1671A7E4B38C8F69
                                                                                      SHA-512:97726D7EDB7D7A1F6E815A0B875CAF9E2D2D27F50ECC866FBC6CB1B88836E8C2D64A9C108CD917C9D641B30822397664A2AC8010EADF0FF2A6C205AE4D5E7A2F
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Indiana/Knox)]} {. LoadTimeZoneFile America/Indiana/Knox.}.set TZData(:US/Indiana-Starke) $TZData(:America/Indiana/Knox).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):180
                                                                                      Entropy (8bit):4.7846496799669405
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx06FQGFwVAIg206FQN6iHaMCELMr4IAcGE6FQu:SlSWB9IZaM3y74PFwVAIgp4xiHaMHL+U
                                                                                      MD5:80A9A00EC1C5904A67DC3E8B2FDC3150
                                                                                      SHA1:8E79FBEB49D9620E793E4976D0B9085E32C57E83
                                                                                      SHA-256:8DB76FC871DD334DA87297660B145F8692AD053B352A19C2EFCD74AF923D762D
                                                                                      SHA-512:0A5662E33C60030265ECAD1FF683B18F6B99543CA5FE22F88BCE597702FBEA20358BCB9A568D7F8B32158D9E6A3D294081D183644AD49C22AC3512F97BE480D4
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Detroit)]} {. LoadTimeZoneFile America/Detroit.}.set TZData(:US/Michigan) $TZData(:America/Detroit).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):177
                                                                                      Entropy (8bit):4.84430947557215
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx06RGFwVAIg206RAO0LiBOlLo/4IAcGE6Ru:SlSWB9IZaM3y7+SwVAIgp+iLiBY8/49G
                                                                                      MD5:13D6C7CF459995691E37741ACAF0A18D
                                                                                      SHA1:A0626763930C282DF21ED3AA8F1B35033BA2F9DC
                                                                                      SHA-256:223B5C8E34F459D7B221B83C45DBB2827ABE376653BAA1BC56D09D50DF136B08
                                                                                      SHA-512:9076DFECC5D02DB38ECE3D2512D52566675D98A857711676E891D8741EA588153954357FE19F4C69305FF05D0F99286F1D496DF0C7FDBC8D59803D1B1CFA5F07
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Denver)]} {. LoadTimeZoneFile America/Denver.}.set TZData(:US/Mountain) $TZData(:America/Denver).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):191
                                                                                      Entropy (8bit):4.885594237758327
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqx0ydJg4owFVAIg20ydJEvRLiP+e2IAcGEydJgvn:SlSWB9IZaM3y7DvwFVAIgpdJLip290Dv
                                                                                      MD5:EBF51CD015BD387FA2BB30DE8806BDDA
                                                                                      SHA1:63C2E2F4CD8BC719A06D59EF4CE4C31F17F53EA0
                                                                                      SHA-256:B7AD78FB955E267C0D75B5F7279071EE17B6DD2842DAD61ADA0165129ADE6A86
                                                                                      SHA-512:22BECE2AEAD66D921F38B04FDC5A41F2627FCC532A171EA1C9C9457C22CD79EFD1EC3C7CC62BC016751208AD1D064B0F03C2185F096982F73740D8426495F5ED
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Los_Angeles)]} {. LoadTimeZoneFile America/Los_Angeles.}.set TZData(:US/Pacific) $TZData(:America/Los_Angeles).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):195
                                                                                      Entropy (8bit):4.931883193402467
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:SlSWB9IZaM3y7DvwFVAIgpdJLi0Q90Dvn:MBaIMYFpdJLix90z
                                                                                      MD5:01CD3EBFDB7715805572CDA3F81AC78A
                                                                                      SHA1:C013C38D2FB9E649EE43FED6910382150C2B3DF5
                                                                                      SHA-256:DEFE67C520303EF85B381EBEAED4511C0ACF8C49922519023C525E6A1B09B9DD
                                                                                      SHA-512:266F35C34001CD4FF00F51F5CDF05E1F4D0B037F276EFD2D124C8AE3391D00128416D16D886B3ECDF9E9EFC81C66B2FD4ED55F154437ED5AA32876B855289190
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(America/Los_Angeles)]} {. LoadTimeZoneFile America/Los_Angeles.}.set TZData(:US/Pacific-New) $TZData(:America/Los_Angeles).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):183
                                                                                      Entropy (8bit):4.789322986138067
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqTQGurKeTIVAIgObTurKeUAti6A5nUDHurKeTv:SlSWB9IZaM3ycieZVAIgObieiidXeg
                                                                                      MD5:E883D478518F6DAF8173361A8D308D34
                                                                                      SHA1:ABD97858655B0069BFD5E11DD95BF6D7C2109AEA
                                                                                      SHA-256:DD4B1812A309F90ABBD001C3C73CC2AF1D4116128787DE961453CCBE53EC9B6A
                                                                                      SHA-512:DA1FE6D92424404111CBB18CA39C8E29FA1F9D2FD262D46231FB7A1A78D79D00F92F5D1DEBB9B92565D1E3BA03EF20D2A44B76BA0FC8B257A601EED5976386CC
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Pacific/Pago_Pago)]} {. LoadTimeZoneFile Pacific/Pago_Pago.}.set TZData(:US/Samoa) $TZData(:Pacific/Pago_Pago).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):148
                                                                                      Entropy (8bit):4.792993822845485
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLiLB5h8RFu:SlSWB9IZaM3yzUFVAIgBLiLfh8RI
                                                                                      MD5:530F5381F9CD8542ED5690E47FC83358
                                                                                      SHA1:29A065F004F23A5E3606C2DB50DC0AB28CAFC785
                                                                                      SHA-256:AC0FF734DA267E5F20AB573DBD8C0BD7613B84D86FDA3C0809832F848E142BC8
                                                                                      SHA-512:4328BDFD6AA935FD539EE2D4A3EBA8DD2A1BD9F44BA0CF30AA0C4EA57B0A58E3CDFAA312366A0F93766AE445E6E210EE57CD5ED60F74173EDF67C1C5CB987C68
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:UTC) $TZData(:Etc/UTC).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):154
                                                                                      Entropy (8bit):4.829496870339919
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLiL7DJMFfh8RFu:SlSWB9IZaM3yzUFVAIgBLiL7VMr8RI
                                                                                      MD5:60878BB8E8BE290911CAB2A16AAFAEF7
                                                                                      SHA1:15C01523EDA134D3E38ECC0A5909A4579BD2A00D
                                                                                      SHA-256:9324B6C871AC55771C44B82BF4A92AE0BE3B2CC64EBA9FE878571225FD38F818
                                                                                      SHA-512:C697401F1C979F5A4D33E1026DCE5C77603E56A48405511A09D8CE178F1BF47D60F217E7897061F71CFEA63CC041E64340EF6BAEE0EB037AFD34C71BF0591E3E
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:Universal) $TZData(:Etc/UTC).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):167
                                                                                      Entropy (8bit):4.9534620854837295
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqxVwTwpVAIgoqzTcYFgIuyQauTnn:SlSWB9IZaM3ymdVAIgohYFgXymn
                                                                                      MD5:58FBF79D86DBCFF53F74BF7FE5C12DD6
                                                                                      SHA1:EA8B3317B012A661B3BA4A1FAE0DC5DEDC03BC26
                                                                                      SHA-256:0DECFEACCE2E2D88C29CB696E7974F89A687084B3DB9564CDED6FC97BCD74E1F
                                                                                      SHA-512:083B449DE987A634F7199666F9C685EADD643C2C2DD9C8F6C188388266729CE0179F9DC0CD432D713E5FB1649D0AA1A066FE616FC43DA65C4CD787D8E0DE00A6
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Europe/Moscow)]} {. LoadTimeZoneFile Europe/Moscow.}.set TZData(:W-SU) $TZData(:Europe/Moscow).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6694
                                                                                      Entropy (8bit):3.6896780927557495
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:D6U5vo30NSfAewvtj544IrvfMS4pBs6nLUxZlJFXmA3SG7iL8malvkUEYo4Q:5PIMj544IrvfMsbxZTH7qwQ
                                                                                      MD5:CD86A6ED164FEB33535D74DF52DC49A5
                                                                                      SHA1:89843BF23AB113847DCC576990A4FF2CABCA03FE
                                                                                      SHA-256:AF28754C77BA41712E9C49EF3C9E08F7D43812E3317AD4E2192E971AD2C9B02D
                                                                                      SHA-512:80C0A7C3BDD458CA4C1505B2144A3AD969F7B2F2732CCBE4E773FBB6ED446C2961E0B5AFFBC124D43CE9AB530C42C8AEC7100E7817566629CE9D01AC057E3549
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit..set TZData(:WET) {. {-9223372036854775808 0 0 WET}. {228877200 3600 1 WEST}. {243997200 0 0 WET}. {260326800 3600 1 WEST}. {276051600 0 0 WET}. {291776400 3600 1 WEST}. {307501200 0 0 WET}. {323830800 3600 1 WEST}. {338950800 0 0 WET}. {354675600 3600 1 WEST}. {370400400 0 0 WET}. {386125200 3600 1 WEST}. {401850000 0 0 WET}. {417574800 3600 1 WEST}. {433299600 0 0 WET}. {449024400 3600 1 WEST}. {465354000 0 0 WET}. {481078800 3600 1 WEST}. {496803600 0 0 WET}. {512528400 3600 1 WEST}. {528253200 0 0 WET}. {543978000 3600 1 WEST}. {559702800 0 0 WET}. {575427600 3600 1 WEST}. {591152400 0 0 WET}. {606877200 3600 1 WEST}. {622602000 0 0 WET}. {638326800 3600 1 WEST}. {654656400 0 0 WET}. {670381200 3600 1 WEST}. {686106000 0 0 WET}. {701830800 3600 1 WEST}. {717555600 0 0 WET}. {733280400 3600 1 WEST}. {749005200 0 0 WET}. {764730000 36
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):149
                                                                                      Entropy (8bit):4.830292555237936
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SlEVFRKvJT8QFCZaMuUyqAxmSwFVAIgESRLtaFBURFu:SlSWB9IZaM3yzUFVAIgBLYFaRI
                                                                                      MD5:6C7C2CE174DB462A3E66D9A8B67A28EB
                                                                                      SHA1:73B74BEBCDAEBDA4F46748BCA149BC4C7FE82722
                                                                                      SHA-256:4472453E5346AAA1E1D4E22B87FDC5F3170AA013F894546087D0DC96D4B6EC43
                                                                                      SHA-512:07209059E5E5EB5EE12821C1AC46922DA2715EB7D7196A478F0FA6866594D3C69F4C50006B0EE517CBF6DB07164915F976398EBBD88717A070D750D5D106BA5D
                                                                                      Malicious:false
                                                                                      Preview:# created by tools/tclZIC.tcl - do not edit.if {![info exists TZData(Etc/UTC)]} {. LoadTimeZoneFile Etc/UTC.}.set TZData(:Zulu) $TZData(:Etc/UTC).
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4860
                                                                                      Entropy (8bit):4.7851008522116585
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:Le+U54W37GWdh85qWdhAjgr9a+1FeS9D/CkXg6gvF9D/CYjX16AyyrGuA11/JRJZ:q+W/7GW85qW9a+P39DCd6gt9DC+6AjGN
                                                                                      MD5:C5DA264DC0CE5669F81702170B2CDC59
                                                                                      SHA1:FED571B893EE2DC93DAF8907195503885FFACBB6
                                                                                      SHA-256:A5311E3640E42F7EFF5CC1A0D8AD6956F738F093B037155674D46B634542FE5F
                                                                                      SHA-512:1F1993F1F19455F87EC9952BF7CEA00A5082BD2F2E1A417FBC4F239835F3CED6C8D5E09CDA6D1A4CD9F8A24AF174F9AB1DC7BD5E94C7A6DEE2DD9F8FE7F690FF
                                                                                      Malicious:false
                                                                                      Preview:# word.tcl --.#.# This file defines various procedures for computing word boundaries in.# strings. This file is primarily needed so Tk text and entry widgets behave.# properly for different platforms..#.# Copyright (c) 1996 by Sun Microsystems, Inc..# Copyright (c) 1998 by Scritpics Corporation..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...# The following variables are used to determine which characters are.# interpreted as white space...if {$::tcl_platform(platform) eq "windows"} {. # Windows style - any but a unicode space char. if {![info exists ::tcl_wordchars]} {..set ::tcl_wordchars {\S}. }. if {![info exists ::tcl_nonwordchars]} {..set ::tcl_nonwordchars {\s}. }.} else {. # Motif style - any unicode word char (number, letter, or underscore). if {![info exists ::tcl_wordchars]} {..set ::tcl_wordchars {\w}. }. if {![info exists ::tcl_nonwordchars]} {..set ::tcl_nonwo
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):1468064
                                                                                      Entropy (8bit):6.165850680457804
                                                                                      Encrypted:false
                                                                                      SSDEEP:24576:J7+Vm6O8hbcrckTNrkhaJVQhWnmb7u/DSe9qT03ZjLmFMoERDY5TUT/tXzddGyIK:JCQ69cYY9JVQWx/DSe9qTqJLUMPsJUT/
                                                                                      MD5:FDC8A5D96F9576BD70AA1CADC2F21748
                                                                                      SHA1:BAE145525A18CE7E5BC69C5F43C6044DE7B6E004
                                                                                      SHA-256:1A6D0871BE2FA7153DE22BE008A20A5257B721657E6D4B24DA8B1F940345D0D5
                                                                                      SHA-512:816ADA61C1FD941D10E6BB4350BAA77F520E2476058249B269802BE826BAB294A9C18EDC5D590F5ED6F8DAFED502AB7FFB29DB2F44292CB5BEDF2F5FA609F49C
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................B................R..................Rich..................PE..d......\.........." .........J......@........................................p.......f....`.............................................@@..P>..|........{......,....L.......0...?..`................................................ ..P............................text...c........................... ..`.rdata...?... ...@..................@..@.data........`.......N..............@....pdata..,...........................@..@.rsrc....{.......|..................@..@.reloc...?...0...@..................@..B........................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8246
                                                                                      Entropy (8bit):4.8180558683809425
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:tKrjbDL5//nNFn0rBnDQQ2d4YGpFAImoYyMxZ34wNsf9GnEF5SpcJV+H//iNx:tIjL5//zC/8HLx4XKKv
                                                                                      MD5:11D758CEF126C5C2EDFC911237DF80F2
                                                                                      SHA1:7911EAA0A8B6630D016D15730310935909632389
                                                                                      SHA-256:DA84D32D1B447F7FFE7BBCAC0F7586B0B6DD204717C7AE1F182C6A91510EC77B
                                                                                      SHA-512:9E2A767FBC62622C34F468958C861EE3AFE2A63005BAD80F1637045D045E1A82FB1D2698D948D375222EBD0B92514ACE99C12DF6D9CACF75ACD03EC8057494A7
                                                                                      Malicious:false
                                                                                      Preview:# bgerror.tcl --.#.#.Implementation of the bgerror procedure. It posts a dialog box with.#.the error message and gives the user a chance to see a more detailed.#.stack trace, and possible do something more interesting with that.#.trace (like save it to a log). This is adapted from work done by.#.Donal K. Fellows..#.# Copyright (c) 1998-2000 by Ajuba Solutions..# Copyright (c) 2007 by ActiveState Software Inc..# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>.# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>..namespace eval ::tk::dialog::error {. namespace import -force ::tk::msgcat::*. namespace export bgerror. option add *ErrorDialog.function.text [mc "Save To Log"] \..widgetDefault. option add *ErrorDialog.function.command [namespace code SaveToLog]. option add *ErrorDialog*Label.font TkCaptionFont widgetDefault. if {[tk windowingsystem] eq "aqua"} {..option add *ErrorDialog*background systemAlertBackgroundActive \...widgetDefault.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):20642
                                                                                      Entropy (8bit):4.903366631227966
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:8zVtoY3wFnq+j4SpEdPmVmZ6/IVKuzmSaox2ESo+VtocUP5wFnq+j4SpEdPmV8ZQ:coahPSFMmfoz4oFXhPovzmToQBy0zm2m
                                                                                      MD5:309AB5B70F664648774453BCCBE5D3CE
                                                                                      SHA1:51BF685DEDD21DE3786FE97BC674AB85F34BD061
                                                                                      SHA-256:0D95949CFACF0DF135A851F7330ACC9480B965DAC7361151AC67A6C667C6276D
                                                                                      SHA-512:D5139752BD7175747A5C912761916EFB63B3C193DD133AD25D020A28883A1DEA6B04310B751F5FCBE579F392A8F5F18AE556116283B3E137B4EA11A2C536EC6B
                                                                                      Malicious:false
                                                                                      Preview:# button.tcl --.#.# This file defines the default bindings for Tk label, button,.# checkbutton, and radiobutton widgets and provides procedures.# that help in implementing those bindings..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1996 Sun Microsystems, Inc..# Copyright (c) 2002 ActiveState Corporation..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# The code below creates the default class bindings for buttons..#-------------------------------------------------------------------------..if {[tk windowingsystem] eq "aqua"} {.. bind Radiobutton <Enter> {..tk::ButtonEnter %W. }. bind Radiobutton <1> {..tk::ButtonDown %W. }. bind Radiobutton <ButtonRelease-1> {..tk::ButtonUp %W. }. bind Checkbutton <Enter> {..tk::ButtonEnter %W. }. bind Checkbutton <1
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Nim source code, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9652
                                                                                      Entropy (8bit):4.750454352074374
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:MvjK3vpIKU7JBhpZofNAieYemp8U3wNV97oZQWpopePXUsyWjocIegf6tq9jJKT4:M4viKeBQ+3M3wNwvwsFyoIegf6wO70fN
                                                                                      MD5:E703C16058E7F783E9BB4357F81B564D
                                                                                      SHA1:1EDA07870078FC4C3690B54BB5330A722C75AA05
                                                                                      SHA-256:30CE631CB1CCCD20570018162C6FFEF31BAD378EF5B2DE2D982C96E65EB62EF6
                                                                                      SHA-512:28617F8553766CA7A66F438624AFA5FD7780F93DC9EBDF9BEE865B5649228AA56A69189218FC436CEDF2E5FE3162AD88839CBF49C9CC051238A7559B5C3BA726
                                                                                      Malicious:false
                                                                                      Preview:# choosedir.tcl --.#.#.Choose directory dialog implementation for Unix/Mac..#.# Copyright (c) 1998-2000 by Scriptics Corporation..# All rights reserved...# Make sure the tk::dialog namespace, in which all dialogs should live, exists.namespace eval ::tk::dialog {}.namespace eval ::tk::dialog::file {}..# Make the chooseDir namespace inside the dialog namespace.namespace eval ::tk::dialog::file::chooseDir {. namespace import -force ::tk::msgcat::*.}..# ::tk::dialog::file::chooseDir:: --.#.#.Implements the TK directory selection dialog..#.# Arguments:.#.args..Options parsed by the procedure..#.proc ::tk::dialog::file::chooseDir:: {args} {. variable ::tk::Priv. set dataName __tk_choosedir. upvar ::tk::dialog::file::$dataName data. Config $dataName $args.. if {$data(-parent) eq "."} {. set w .$dataName. } else {. set w $data(-parent).$dataName. }.. # (re)create the dialog box if necessary. #. if {![winfo exists $w]} {..::tk::dialog::file::Create
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):21432
                                                                                      Entropy (8bit):4.987740767386718
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:HDJsgeqJelEu6i1T26UYdTVDyPHxQlufbSIjVjrdOqAQBxhKN2zD5Ed9bmqU/FC6:jagJJnBfxQef9
                                                                                      MD5:E5E462E0EE0C57B31DAEECB07D038488
                                                                                      SHA1:E67B3410A7BCECE8B5159AB5327910038096A67B
                                                                                      SHA-256:823F6E4BAF5D10185D990B3FBCB8BFB4D5F4B6ED62203EE229922B6B32FE39D4
                                                                                      SHA-512:F8442F21E389FF9A3FC5BECCE8811F8554DEF94FBB8F184026396A87AEA37E8108A3E1B3C76FEA2CFBE4E81B2C5FC2BB8A60BE2B9831CC96CB25DAB177616238
                                                                                      Malicious:false
                                                                                      Preview:# clrpick.tcl --.#.#.Color selection dialog for platforms that do not support a.#.standard color selection dialog..#.# Copyright (c) 1996 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#.# ToDo:.#.#.(1): Find out how many free colors are left in the colormap and.#. don't allocate too many colors..#.(2): Implement HSV color selection..#..# Make sure namespaces exist.namespace eval ::tk {}.namespace eval ::tk::dialog {}.namespace eval ::tk::dialog::color {. namespace import ::tk::msgcat::*.}..# ::tk::dialog::color:: --.#.#.Create a color dialog and let the user choose a color. This function.#.should not be called directly. It is called by the tk_chooseColor.#.function when a native color selector widget does not exist.#.proc ::tk::dialog::color:: {args} {. variable ::tk::Priv. set dataName __tk__color. upvar ::tk::dialog::color::$dataName data. set w .$dataName.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8229
                                                                                      Entropy (8bit):5.0540566175865
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:Aq7cPy5HEOjKU8QHyWpSWNRYs50asAZ5QWlO+W0WvHv/3WvWHwV7vWKpTTk:Aq7c6HJjKCyWpZNRYEVVET1rvveuHSOT
                                                                                      MD5:427CCBD25BB1559B9B21A80131658140
                                                                                      SHA1:B675C0C1B02A527B13AA5DE2AE5A1AA754E9815D
                                                                                      SHA-256:586CB7A3C32566EFEB46036A19D07E91194CE8EDAF0D47F3C93BCC974E6EE3E1
                                                                                      SHA-512:FEA82D6D7DBAF52EE1883241170BA95396EC282CDD4F682077A238B4FD9A47C4CE6F84B1B4829A86580A4AB794820E6CD4C1E98CFB7BDCE23E09B54566BD6443
                                                                                      Malicious:false
                                                                                      Preview:# comdlg.tcl --.#.#.Some functions needed for the common dialog boxes. Probably need to go.#.in a different file..#.# Copyright (c) 1996 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# tclParseConfigSpec --.#.#.Parses a list of "-option value" pairs. If all options and.#.values are legal, the values are stored in.#.$data($option). Otherwise an error message is returned. When.#.an error happens, the data() array may have been partially.#.modified, but all the modified members of the data(0 array are.#.guaranteed to have valid values. This is different than.#.Tk_ConfigureWidget() which does not modify the value of a.#.widget record if any error occurs..#.# Arguments:.#.# w = widget record to modify. Must be the pathname of a widget..#.# specs = {.# {-commandlineswitch resourceName ResourceClass defaultValue verifier}.# {....}.# }.#.# flags = currently unused..#.# argList
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):32784
                                                                                      Entropy (8bit):4.906598115585926
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:GkptctbjWz4xjtyU/W1ZQWSLEwYGl7nZH5J+ry3+uQlLW44qvRHRJStCO2FfB25b:GkpeZWz4miZeG7J+rMYXaGGWFOYoV
                                                                                      MD5:8B5B8B6D49F4CA36B8662923DCF9A46C
                                                                                      SHA1:BCD6CA7451BDFB22311D9D54FBABB116D4A7A687
                                                                                      SHA-256:7E1EAA998B1D661E9B4B72A4598A534B8311AB75D444525DD613EC73F8126750
                                                                                      SHA-512:D7E20377E2FBD147A68E4B647D4F09A1894A203F2FA5435B09AD2B6998FFC2F70222BD2808B6A1D1B6A96271F04E7C7A4E6AB0EAE4C97C7C728A6645C499391F
                                                                                      Malicious:false
                                                                                      Preview:# console.tcl --.#.# This code constructs the console window for an application. It.# can be used by non-unix systems that do not have built-in support.# for shells..#.# Copyright (c) 1995-1997 Sun Microsystems, Inc..# Copyright (c) 1998-2000 Ajuba Solutions..# Copyright (c) 2007-2008 Daniel A. Steffen <das@users.sourceforge.net>.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# TODO: history - remember partially written command..namespace eval ::tk::console {. variable blinkTime 500 ; # msecs to blink braced range for. variable blinkRange 1 ; # enable blinking of the entire braced range. variable magicKeys 1 ; # enable brace matching and proc/var recognition. variable maxLines 600 ; # maximum # of lines buffered in console. variable showMatches 1 ; # show multiple expand matches. variable useFontchooser [llength [info command ::tk::fontchooser]]. variable inPlugi
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):6025
                                                                                      Entropy (8bit):4.79563398407639
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:WfPQCAV8OgciKHKKcmQH+DmlYm4Kapo9mBc//IWxIb:WfPQCAVviKHKK4H+DmT4Kapo4cnDOb
                                                                                      MD5:EAC165BD7EA915B44FAEC016250E0B06
                                                                                      SHA1:7D205F2720E00FBDA5C0AA908CAC3F66BBC84E56
                                                                                      SHA-256:6D7BD4A280272E7A2748555CFFFF4FCA7CC57CE611AEB2382E3C80CDD1868D22
                                                                                      SHA-512:22D5794E1FF3B94365C560A310CC17B4A27BEA87DBF423DFB44273443477372013B19ED33E170EAB15A1F06BA9186BA2FC184A3751449E7EDC760D23A12B1666
                                                                                      Malicious:false
                                                                                      Preview:# dialog.tcl --.#.# This file defines the procedure tk_dialog, which creates a dialog.# box containing a bitmap, a message, and one or more buttons..#.# Copyright (c) 1992-1993 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#.# ::tk_dialog:.#.# This procedure displays a dialog box, waits for a button in the dialog.# to be invoked, then returns the index of the selected button. If the.# dialog somehow gets destroyed, -1 is returned..#.# Arguments:.# w -..Window to use for dialog top-level..# title -.Title to display in dialog's decorative frame..# text -.Message to display in dialog..# bitmap -.Bitmap to display in dialog (empty string means none)..# default -.Index of button that is to display the default ring.#..(-1 means none)..# args -.One or more strings to display in buttons across the.#..bottom of t
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):16950
                                                                                      Entropy (8bit):4.934745561122632
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:P/eFkH2fRdOnOeQod3tCAERebMIDlXVQgXwVviw:P2FDqUy8V
                                                                                      MD5:BE28D16510EE78ECC048B2446EE9A11A
                                                                                      SHA1:4829D6E8AB8A283209FB4738134B03B7BD768BAD
                                                                                      SHA-256:8F57A23C5190B50FAD00BDEE9430A615EBEBFC47843E702374AE21BEB2AD8B06
                                                                                      SHA-512:F56AF7020531249BC26D88B977BAFFC612B6566146730A681A798FF40BE9EBC04D7F80729BAFE0B9D4FAC5B0582B76F9530F3FE376D42A738C9BC4B3B442DF1F
                                                                                      Malicious:false
                                                                                      Preview:# entry.tcl --.#.# This file defines the default bindings for Tk entry widgets and provides.# procedures that help in implementing those bindings..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# Elements of tk::Priv that are used in this file:.#.# afterId -..If non-null, it means that auto-scanning is underway.#...and it gives the "after" id for the next auto-scan.#...command to be executed..# mouseMoved -..Non-zero means the mouse has moved a significant.#...amount since the button went down (so, for example,.#...start dragging out a selection)..# pressX -..X-coordinate at which the mouse button was pressed..# selectMode -..The style of selection currently underway:.#...char, word, or line..# x, y -..La
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4857
                                                                                      Entropy (8bit):4.7675047842795895
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:mumhRUI7F2WyHm6BUyNhEf6jUHKRUI7F2WyQe6L763AcnK0/61sk2ko5AgEplauw:ERUQFU52CNRUQFpLOQIG1sk2TCLplauw
                                                                                      MD5:7EA007F00BF194722FF144BE274C2176
                                                                                      SHA1:6835A515E85A9E55D5A27073DAE1F1A5D7424513
                                                                                      SHA-256:40D4E101A64B75361F763479B01207AE71535337E79CE6E162265842F6471EED
                                                                                      SHA-512:E2520EB065296C431C71DBBD5503709CF61F93E74FE324F4F8F3FE13131D62435B1E124D38E2EC84939B92198A54B8A71DFC0A8D32F0DD94139C54068FBCAAF2
                                                                                      Malicious:false
                                                                                      Preview:# focus.tcl --.#.# This file defines several procedures for managing the input.# focus..#.# Copyright (c) 1994-1995 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# ::tk_focusNext --.# This procedure returns the name of the next window after "w" in.# "focus order" (the window that should receive the focus next if.# Tab is typed in w). "Next" is defined by a pre-order search.# of a top-level and its non-top-level descendants, with the stacking.# order determining the order of siblings. The "-takefocus" options.# on windows determine whether or not they should be skipped..#.# Arguments:.# w -..Name of a window...proc ::tk_focusNext w {. set cur $w. while {1} {...# Descend to just before the first child of the current widget....set parent $cur..set children [winfo children $cur]..set i -1...# Look for the next sibling that isn't a top-level....while {1} {.. incr i..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):15840
                                                                                      Entropy (8bit):4.7139053935905535
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:hrAVUJgzMAP2Xg7V5M8Zyc8Ck/YN9G4EM8CPo:hrAVUJgzMAP2Xg7V5MgycO/YpEX
                                                                                      MD5:9324DBBE37502E149474E05A3448B6E3
                                                                                      SHA1:5584B4EE3BF25E95EE6919437D066586060B6E36
                                                                                      SHA-256:CEB558FB76A2C85924CD5F7D3A64E77582E1D461DD9A3C10FEDB4608AD440F5B
                                                                                      SHA-512:C688676452F89EC432E93A64AC369CC0B82B19D8D38D2C4034888551591F59D87548FAE12A98EE7735540779566DEB400C27BEAD2C141A9F971BAF9E61C218C6
                                                                                      Malicious:false
                                                                                      Preview:# fontchooser.tcl -.#.#.A themeable Tk font selection dialog. See TIP #324..#.# Copyright (C) 2008 Keith Vetter.# Copyright (C) 2008 Pat Thoyts <patthoyts@users.sourceforge.net>.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...namespace eval ::tk::fontchooser {. variable S.. set S(W) .__tk__fontchooser. set S(fonts) [lsort -dictionary [font families]]. set S(styles) [list \. [::msgcat::mc "Regular"] \. [::msgcat::mc "Italic"] \. [::msgcat::mc "Bold"] \. [::msgcat::mc "Bold Italic"] \. ].. set S(sizes) {8 9 10 11 12 14 16 18 20 22 24 26 28 36 48 72}. set S(strike) 0. set S(under) 0. set S(first) 1. set S(sampletext) [::msgcat::mc "AaBbYyZz01"]. set S(-parent) .. set S(-title) [::msgcat::mc "Font"]. set S(-command) "". set S(-font) TkDefaultFont.}..proc ::tk:
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):15978
                                                                                      Entropy (8bit):4.8947909611129905
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:xj0OECzN+8JERNLKZhbgIDx3VM5BxBTSgvpn8WYYW5Xb50To3u8PYHPtJYa5PWDx:xrDJE36a7BegvV8hFI8gvXaSn9HqD/U0
                                                                                      MD5:105529990CEE968AA5EE3BC827A81A0F
                                                                                      SHA1:559BD1AABD1D4719EDB60448CF111F78365A57A9
                                                                                      SHA-256:DE0195CCFB6482CCA390C94E91B7877F47742E7A9468CAF362B39AA36305D33C
                                                                                      SHA-512:03CB42DFF7AC4F801AA7FFE8A4F07555CCE6874AA1B7F568ACF0299E4DD7F440179838485777F15183EE7C057CCB35868672B1783FBFE67B51D97DBBDAC85281
                                                                                      Malicious:false
                                                                                      Preview:# iconlist.tcl.#.#.Implements the icon-list megawidget used in the "Tk" standard file.#.selection dialog boxes..#.# Copyright (c) 1994-1998 Sun Microsystems, Inc..# Copyright (c) 2009 Donal K. Fellows.#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES..#.# API Summary:.#.tk::IconList <path> ?<option> <value>? ....#.<path> add <imageName> <itemList>.#.<path> cget <option>.#.<path> configure ?<option>? ?<value>? ....#.<path> deleteall.#.<path> destroy.#.<path> get <itemIndex>.#.<path> index <index>.#.<path> invoke.#.<path> see <index>.#.<path> selection anchor ?<int>?.#.<path> selection clear <first> ?<last>?.#.<path> selection get.#.<path> selection includes <item>.#.<path> selection set <first> ?<last>?...package require Tk 8.6..::tk::Megawidget create ::tk::IconList ::tk::FocusableWidget {. variable w canvas sbar accel accelCB fill font index \..itemList itemsPerColumn list maxIH maxIW maxTH maxTW noSc
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):10883
                                                                                      Entropy (8bit):6.026473720997027
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:TJjPyYK20kt4zHIXM2MxGwwOw0ac5lCssUOixDgzAjTXBHVXPZmEhr:pO2gz6MioacR2iBgzsFHX5r
                                                                                      MD5:2652AAD862E8FE06A4EEDFB521E42B75
                                                                                      SHA1:ED22459AD3D192AB05A01A25AF07247B89DC6440
                                                                                      SHA-256:A78388D68600331D06BB14A4289BC1A46295F48CEC31CEFF5AE783846EA4D161
                                                                                      SHA-512:6ECFBB8D136444A5C0DBBCE2D8A4206F1558BDD95F111D3587B095904769AC10782A9EA125D85033AD6532EDF3190E86E255AC0C0C81DC314E02D95CCA86B596
                                                                                      Malicious:false
                                                                                      Preview:# icons.tcl --.#.#.A set of stock icons for use in Tk dialogs. The icons used here.#.were provided by the Tango Desktop project which provides a.#.unified set of high quality icons licensed under the.#.Creative Commons Attribution Share-Alike license.#.(http://creativecommons.org/licenses/by-sa/3.0/).#.#.See http://tango.freedesktop.org/Tango_Desktop_Project.#.# Copyright (c) 2009 Pat Thoyts <patthoyts@users.sourceforge.net>..namespace eval ::tk::icons {}..image create photo ::tk::icons::warning -data {. iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAABHNCSVQICAgIfAhkiAAABSZJREFU. WIXll1toVEcYgL+Zc87u2Yu7MYmrWRuTJuvdiMuqiJd4yYKXgMQKVkSjFR80kFIVJfWCWlvpg4h9. 8sXGWGof8iKNICYSo6JgkCBEJRG8ImYThNrNxmaTeM7pQ5IlJkabi0/9YZhhZv7///4z/8zPgf+7. KCNRLgdlJijXwRyuDTlcxV9hbzv8nQmxMjg+XDtiOEplkG9PSfkztGmTgmFQd+FCVzwa3fYN/PHZ. AcpBaReicW5xcbb64IEQqko8Lc26d/58cxS+/BY6hmJvyEfQBoUpwWCmW1FErKaGWHU13uRk4QkE. UtxQNFR7QwIoB4eiKD9PWbVKbb10CZmaCqmpxCormRYO26QQx85B0mcD+AeK0xYvHqu1tNDx+DH6. g
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):322
                                                                                      Entropy (8bit):4.341180398587801
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:nVhmHdeA1xNZgkrIf3Ju4dFi6VbGWrWhr3W7FxmVFraGVAJFKyVQR7icrtpwB:nPqf1fZgZA4FJbB6dm7FUjAJVVMM
                                                                                      MD5:FC8A86E10C264D42D28E23D9C75E7EE5
                                                                                      SHA1:F1BA322448D206623F8FE734192F383D8F7FA198
                                                                                      SHA-256:2695ADFF8E900C31B4D86414D22B8A49D6DD865CA3DD99678FA355CDC46093A8
                                                                                      SHA-512:29C2DF0D516B5FC8E52CB61CFCD07AF9C90B40436DFE64CEFDB2813C0827CE65BA50E0828141256E2876D4DC251E934A6854A8E0B02CDAF466D0389BD778AEF0
                                                                                      Malicious:false
                                                                                      Preview:README - images directory..This directory includes images for the Tcl Logo and the Tcl Powered.Logo. Please feel free to use the Tcl Powered Logo on any of your.products that employ the use of Tcl or Tk. The Tcl logo may also be.used to promote Tcl in your product documentation, web site or other.places you so desire..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PostScript document text conforming DSC level 3.0, type EPS
                                                                                      Category:dropped
                                                                                      Size (bytes):32900
                                                                                      Entropy (8bit):5.235207715374815
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:gGTVOEcRWsdEmhp6k/GLrPMlK3pJr/IbYDGDMtBF2Fz6fsFA/fSvqHWukLI2d0Nr:gGTVOEcRWsdEvLrPJ5Jr/IbYDGDMtBFh
                                                                                      MD5:45175418859AF67FE417BD0A053DB6E5
                                                                                      SHA1:2B499B7C4EBC8554ECC07B8408632CAF407FB6D5
                                                                                      SHA-256:F3E77FD94198EC4783109355536638E9162F9C579475383074D024037D1797D3
                                                                                      SHA-512:114A59FD6B99FFD628BA56B8E14FB3B59A0AB6E752E18DEA038F85DBC072BF98492CE9369D180C169EDE9ED2BD521D8C0D607C5E4988F2C83302FC413C6D6A4C
                                                                                      Malicious:false
                                                                                      Preview:%!PS-Adobe-3.0 EPSF-3.0.%%Creator: Adobe Illustrator(TM) 5.5.%%For: (Bud Northern) (Mark Anderson Design).%%Title: (TCL/TK LOGO.ILLUS).%%CreationDate: (8/1/96) (4:58 PM).%%BoundingBox: 251 331 371 512.%%HiResBoundingBox: 251.3386 331.5616 370.5213 511.775.%%DocumentProcessColors: Cyan Magenta Yellow.%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0.%%+ procset Adobe_IllustratorA_AI5 1.0 0.%AI5_FileFormat 1.2.%AI3_ColorUsage: Color.%%DocumentCustomColors: (TCL RED).%%CMYKCustomColor: 0 0.45 1 0 (Orange).%%+ 0 0.25 1 0 (Orange Yellow).%%+ 0 0.79 0.91 0 (TCL RED).%AI3_TemplateBox: 306 396 306 396.%AI3_TileBox: 12 12 600 780.%AI3_DocumentPreview: Macintosh_ColorPic.%AI5_ArtSize: 612 792.%AI5_RulerUnits: 0.%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0.%AI5_TargetResolution: 800.%AI5_NumLayers: 1.%AI5_OpenToView: 90 576 2 938 673 18 1 1 2 40.%AI5_OpenViewLayers: 7.%%EndComments.%%BeginProlog.%%BeginResource: procset Adobe_level2_AI5 1.0 0.%%Title: (Adobe Illustrator (R) Version 5.0 Level 2 Emul
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 89a, 68 x 100
                                                                                      Category:dropped
                                                                                      Size (bytes):2341
                                                                                      Entropy (8bit):6.9734417899888665
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:qF/mIXn3l7+ejbL/4nZEsKPKer1OPQqVRqJbPpRRKOv/UVO47f:81nHL4T0KorxvRKkc847f
                                                                                      MD5:FF04B357B7AB0A8B573C10C6DA945D6A
                                                                                      SHA1:BCB73D8AF2628463A1B955581999C77F09F805B8
                                                                                      SHA-256:72F6B34D3C8F424FF0A290A793FCFBF34FD5630A916CD02E0A5DDA0144B5957F
                                                                                      SHA-512:10DFE631C5FC24CF239D817EEFA14329946E26ED6BCFC1B517E2F9AF81807977428BA2539AAA653A89A372257D494E8136FD6ABBC4F727E6B199400DE05ACCD5
                                                                                      Malicious:false
                                                                                      Preview:GIF89aD.d...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....D.d........H......*\...z..Ht@Q...92.p...z.$.@@.E..u.Y.2..0c..q.cB.,[..... ..1..qbM.2~*].....s...S.@.L.j..#..\......h..........].D(..m......@.Z....oO...3=.c...G".(..pL...q]..%....[...#...+...X.h....^.....
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 89a, 43 x 64
                                                                                      Category:dropped
                                                                                      Size (bytes):1670
                                                                                      Entropy (8bit):6.326462043862671
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:PF/mIXn3l7+ejbL/4xsgq4sNC6JYp6s/pmp76F:/1nHL404raM/op2
                                                                                      MD5:B226CC3DA70AAB2EBB8DFFD0C953933D
                                                                                      SHA1:EA52219A37A140FD98AEA66EA54685DD8158D9B1
                                                                                      SHA-256:138C240382304F350383B02ED56C69103A9431C0544EB1EC5DCD7DEC7A555DD9
                                                                                      SHA-512:3D043F41B887D54CCADBF9E40E48D7FFF99B02B6FAF6B1DD0C6C6FEF0F8A17630252D371DE3C60D3EFBA80A974A0670AF3747E634C59BDFBC78544D878D498D4
                                                                                      Malicious:false
                                                                                      Preview:GIF89a+.@...............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....+.@........H. .z..(tp......@...92....#. A.......C.\.%...)Z..1a.8s..W/..@....3..C...y$.GW.....5.FU..j..;.F(Pc+W.-..X.D-[.*g....F..`.:mkT...Lw...A/.....u.7p..a..9P.....q2..Xg..G....3}AKv.\.d..yL.>..1.#
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 89a, 354 x 520
                                                                                      Category:dropped
                                                                                      Size (bytes):11000
                                                                                      Entropy (8bit):7.88559092427108
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:d+nY6zludc/We/yXy9JHBUoIMSapQdrGlapzmyNMK1vbXkgMmgFW/KxIq3NhZe:YnY6p4c/OCHyowaGUaCcMK1vbXNwFW/l
                                                                                      MD5:45D9B00C4CF82CC53723B00D876B5E7E
                                                                                      SHA1:DDD10E798AF209EFCE022E97448E5EE11CEB5621
                                                                                      SHA-256:0F404764D07A6AE2EF9E1E0E8EAAC278B7D488D61CF1C084146F2F33B485F2ED
                                                                                      SHA-512:6E89DACF2077E1307DA05C16EF8FDE26E92566086346085BE10A7FD88658B9CDC87A3EC4D17504AF57D5967861B1652FA476B2DDD4D9C6BCFED9C60BB2B03B6F
                                                                                      Malicious:false
                                                                                      Preview:GIF89ab.................f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3..............f..3.............f..3..........f.3...f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3.............f..3............f..3.............f..3....f..f.f..ff.f3.f..3..3.3..3f.33.3...........f..3...f..f..f..f.ff.3f..f..f..f.f.ff.3f..f..f..f..f.ff.3f..ff.ff.ff.fffff3ff.f3.f3.f3.f3ff33f3.f..f..f..f.ff.3f..3..3..3..3.f3.33..3..3..3.3.f3.33..3..3..3..3.f3.33..3f.3f.3f.3ff3f33f.33.33.33.33f33333.3..3..3..3.f3.33.............f..3.............f..3..............f..3....f..f..f..ff.f3.f..3..3..3..3f.33.3............f..3...............w..U..D..".....................w..U..D..".....................w..U..D..".................wwwUUUDDD"""......,....b..........H......*\....#J.H....3j.... '.;p....(.8X..^.0c.I...z8O.\.....:....$..Fu<8`...P.>%I.gO.C.h-..+.`....@..h....dJ.?...K...H.,U.._.#...g..[.*^.x.....J.L.!.'........=+eZ..i..ynF.8...].y|..m.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 87a, 120 x 181
                                                                                      Category:dropped
                                                                                      Size (bytes):3889
                                                                                      Entropy (8bit):7.425138719078912
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:9qqbIh+cE4C8ric/jxK5mxsFBu3/0GIJ6Qap1Y5uMiR8pw5rB/SgijDb+TOh:hy+mnZ7xK5IsTwDQmkdiiG5rB/BE+6h
                                                                                      MD5:BD12B645A9B0036A9C24298CD7A81E5A
                                                                                      SHA1:13488E4F28676F1E0CE383F80D13510F07198B99
                                                                                      SHA-256:4D0BD3228AB4CC3E5159F4337BE969EC7B7334E265C99B7633E3DAF3C3FCFB62
                                                                                      SHA-512:F62C996857CA6AD28C9C938E0F12106E0DF5A20D1B4B0B0D17F6294A112359BA82268961F2A054BD040B5FE4057F712206D02F2E668675BBCF6DA59A4DA0A1BB
                                                                                      Malicious:false
                                                                                      Preview:GIF87ax............................................................................z.....{..o.....m..b...`{.X....vy...hk.Um.N...I`.D..Z^.LP.?R.;!....?C.5C.3#.l..,6.*&.15...`..#(.If.y.....l...._..#/...Hm.>_.y..4R.k..#6..._......w..*K.^.."<.....G{.w..3_."C.Q..F....v..!K...v.2m.)_.[..!R.u.1t.g..)f. X.O..E..1z.g. _.Z..D..:..0..Z.. f.D..0..'z..m.N..C../.z.svC.q/.m.ze7.\..P..I..1%.,...............................................................................................................................................................................................................................................................................................................................................................................................,....x..........H.......D..!...7.PAQ...._l8.... C.<.a...*.x....0q.. ..M.%.<.HBe.@.....Q..7..XC..P..<z3..X...P.jA.%'@.J.lV.......R.,..+....t....7h.....(..a...+^.'..7..L.....V...s..$....a.....8`.9..}K......
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PostScript document text conforming DSC level 3.0, type EPS
                                                                                      Category:dropped
                                                                                      Size (bytes):27809
                                                                                      Entropy (8bit):5.331778921404698
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:geQTVOEcRWsdEmhp6k/GLrPMlK3pJrNIbYDGDMtBgu2Fz6lR5G/r+FWaGK:gnTVOEcRWsdEvLrPJ5JrNIbYDGDMtB9L
                                                                                      MD5:BA1051DBED2B8676CAA24593B88C91B2
                                                                                      SHA1:8A58FC19B20BFDC8913515D9B32CCBF8ACF92344
                                                                                      SHA-256:2944EBC4AF1894951BF9F1250F4E6EDF811C2183745950EA9A8A926715882CF7
                                                                                      SHA-512:4260CEBA7DA9463F32B0C76A2AC19D2B20C8FE48CFBA3DC7AF748AAE15FA25DCBDA085072DF7EFC8F4B4F304C7ED166FE9F93DC903E32FA1874E82D59E544DEF
                                                                                      Malicious:false
                                                                                      Preview:%!PS-Adobe-3.0 EPSF-3.0.%%Creator: Adobe Illustrator(TM) 5.5.%%For: (Bud Northern) (Mark Anderson Design).%%Title: (TCL PWRD LOGO.ILLUS).%%CreationDate: (8/1/96) (4:59 PM).%%BoundingBox: 242 302 377 513.%%HiResBoundingBox: 242.0523 302.5199 376.3322 512.5323.%%DocumentProcessColors: Cyan Magenta Yellow.%%DocumentSuppliedResources: procset Adobe_level2_AI5 1.0 0.%%+ procset Adobe_IllustratorA_AI5 1.0 0.%AI5_FileFormat 1.2.%AI3_ColorUsage: Color.%%CMYKCustomColor: 0 0.45 1 0 (Orange).%%+ 0 0.25 1 0 (Orange Yellow).%%+ 0 0.79 0.91 0 (PANTONE Warm Red CV).%%+ 0 0.79 0.91 0 (TCL RED).%AI3_TemplateBox: 306 396 306 396.%AI3_TileBox: 12 12 600 780.%AI3_DocumentPreview: Macintosh_ColorPic.%AI5_ArtSize: 612 792.%AI5_RulerUnits: 0.%AI5_ArtFlags: 1 0 0 1 0 0 1 1 0.%AI5_TargetResolution: 800.%AI5_NumLayers: 1.%AI5_OpenToView: 102 564 2 938 673 18 1 1 2 40.%AI5_OpenViewLayers: 7.%%EndComments.%%BeginProlog.%%BeginResource: procset Adobe_level2_AI5 1.0 0.%%Title: (Adobe Illustrator (R) Version 5.0 Le
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 89a, 64 x 100
                                                                                      Category:dropped
                                                                                      Size (bytes):1615
                                                                                      Entropy (8bit):7.461273815456419
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:aE45BzojC3r1WAQ+HT2gAdKhPFZ/ObchgB8:V5Gb1WN+yfcObmgW
                                                                                      MD5:DBFAE61191B9FADD4041F4637963D84F
                                                                                      SHA1:BD971E71AE805C2C2E51DD544D006E92363B6C0C
                                                                                      SHA-256:BCC0E6458249433E8CBA6C58122B7C0EFA9557CBC8FB5F9392EED5D2579FC70B
                                                                                      SHA-512:ACEAD81CC1102284ED7D9187398304F21B8287019EB98B0C4EC7398DD8B5BA8E7D19CAA891AA9E7C22017B73D734110096C8A7B41A070191223B5543C39E87AF
                                                                                      Malicious:false
                                                                                      Preview:GIF89a@.d.............................f.................f...ff.f3.f..33.3.........f..ff.f3.33.3.f..f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....@.d....@.pH,..E.... ..(...H$..v..j....K....q..5L......^).3.Y7..r..u.v|g..om...\iHl..p...`G..\~....fn[q...P.g.Z.l....y...\.l......f.Z.g...%%....e...e...)....O.f..e. ....O..qf..%..(.H.u..]..&....#4.......@.).....u!.M..2. ..PJ..#..T..a.....P.Gi... <Hb....x..z.3.X.O..f.........].Bt..lB.Q.r...9pP....&...L. ..,`[.....E6.Q.....?.#L......|g........N....[.._........."4......b....G6.........m.zI].....I.@.......I.9...glew...2.B..c>./..2....x.....<...{...7;.....y.I.....4G.Qj0..7..%.W.V...?!..[...X..=..k.h..[Q<.....0.B....(P.x.,.......8O*Z.8P!.$....u.c..Ea!..eC....CB.. .H..E..#..C..E...z..&.Nu........c.0..#.T.M.U........l.p @..s.|..pf!..&.......8.#.8.....*..J>. .t..h6(........#..0.A...*!..)...x..u.Z....*%..H.....*.......`......|.....1.......&.....T*...f.l...
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 89a, 97 x 150
                                                                                      Category:dropped
                                                                                      Size (bytes):2489
                                                                                      Entropy (8bit):7.708754027741608
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:/Ev7JJ+3uvz/Hwbcp7igaIwjBui7qFxIIOdJXcI+Ks:M9oWz/7pZAV7qPIImJXtXs
                                                                                      MD5:711F4E22670FC5798E4F84250C0D0EAA
                                                                                      SHA1:1A1582650E218B0BE6FFDEFFD64D27F4B9A9870F
                                                                                      SHA-256:5FC25C30AEE76477F1C4E922931CC806823DF059525583FF5705705D9E913C1C
                                                                                      SHA-512:220C36010208A87D0F674DA06D6F5B4D6101D196544ABCB4EE32378C46C781589DB1CE7C7DFE6471A8D8E388EE6A279DB237B18AF1EB9130FF9D0222578F1589
                                                                                      Malicious:false
                                                                                      Preview:GIF89aa...............................f.................f...ff.f3.f..33.3............f..ff.f3.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,....a......@.pH,...r.l:..TB.T..V..z..H.j..h...&.......t"....F...d..gN~Y...g....}..r....g.....o...g.......Y.w..W......N....Z....W....f...tL.~.f....New............W.M.r.........O.q........W-./i.*...`..z..F9.../9..-.......$6..G..S...........zB.,nw.64...e4.......HOt......f.....)..OX..C.eU.(.Qh.....T..<Q.Y.P.L.YxT....2........ji..3.^)zz..O.a..6 ...TZ........^...7.....>|P.....w$...k.ZF.\R.u....F.]Z.--(v+)[Y....=.!.W..+.]..]._.....&..../Ap...j...!..b.:...{.^.=.`...U.....@Hf..\?.(..Lq@.........0..L...a...&.!.....]#..]G \..q...A.H.X[...(.W......,...1a..B...W(.t.8.AdG.)..(P=...Uu.u..A.KM\...'r.R./.W..d2a.0..G...?...B......#H........1Q.0...R....%+...0.I..{.<......QV.tz'.yn.E.p..0i.I.g......L....%....K...A.l.ph.Q.1e...Z....g..2e...smU&d;.J..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 89a, 113 x 175
                                                                                      Category:dropped
                                                                                      Size (bytes):2981
                                                                                      Entropy (8bit):7.758793907956808
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:AmEwM8ioQoHJQBTThKVI7G78NLL120GFBBFXJRxlu+BmO/5lNqm7Eq:B57QoHJQt4II8BZ+jxluZO/5lNqm7Eq
                                                                                      MD5:DA5FB10F4215E9A1F4B162257972F9F3
                                                                                      SHA1:8DB7FB453B79B8F2B4E67AC30A4BA5B5BDDEBD3B
                                                                                      SHA-256:62866E95501C436B329A15432355743C6EFD64A37CFB65BCECE465AB63ECF240
                                                                                      SHA-512:990CF306F04A536E4F92257A07DA2D120877C00573BD0F7B17466D74E797D827F6C127E2BEAADB734A529254595918C3A5F54FDBD859BC325A162C8CD8F6F5BE
                                                                                      Malicious:false
                                                                                      Preview:GIF89aq...............................f.................f...ff.f3.f..33.3............f..ff.f3.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3................................................................!.. -dl-.!.......,....q......@.pH,...r.l:....A}H...v..R......D.VF..,%M....^.....fyzU.P..f...i.....t..Uqe..N..Z..i......~....g......u.....g......\...h.....P...h.....Q..g....Z..h......]......\...M...[..s...c2.+R.$. ......#.....)v..4....MO.b.....9......[.M.........h'..<-..=.....HQD....D?.~......W7. ..V.W0..l....*0p}..KP?c.\@KW.S(..M..B.....-q...S2...*.,..P.{....F..._MAn ....i.Y3............zh.y.j@...a876...ui.i..;K.........p...`.,}w....tv.m...Y..........;.;.e).e&.......-.NC.*4..(........*..F........[,w....f......E....h..a3.T.^.........)...C.N8.h\T...+&.z....g]H..B..#.t6..Z.....j.-..N......TI....A........M?..Q&V'...Mb.f.x...h.$r.U .9..Ci. ].4.Zb..@...X....%..<..b)V!........Y)x......T.....h.p.d..h..(........]@.**J.M.U.Jf...Y.:....F..g:..d..6q.-..
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 89a, 130 x 200
                                                                                      Category:dropped
                                                                                      Size (bytes):3491
                                                                                      Entropy (8bit):7.790611381196208
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:ROGuxkQ9mcV7RXcECEtqCa+6GK8WseNXhewFIp9ZmL4u:ROGwpVOEbqCrWsUhtIk4u
                                                                                      MD5:A5E4284D75C457F7A33587E7CE0D1D99
                                                                                      SHA1:FA98A0FD8910DF2EFB14EDAEC038B4E391FEAB3C
                                                                                      SHA-256:BAD9116386343F4A4C394BDB87146E49F674F687D52BB847BD9E8198FDA382CC
                                                                                      SHA-512:4448664925D1C1D9269567905D044BBA48163745646344E08203FCEF5BA1524BA7E03A8903A53DAF7D73FE0D9D820CC9063D4DA2AA1E08EFBF58524B1D69D359
                                                                                      Malicious:false
                                                                                      Preview:GIF89a................................f.................f...ff.f3.f..33.3............f..ff.3f.33.3.f..ff.ff.ffff3ff333f.3f.33.33f.3...................................................................!.. -dl-.!.......,...........@.pH,...r.l:..T..F$XIe..V$.x..V.Z.z..F.pxd~..........{....o....l..{.b...hi[}P.k...y.....y.f.._R.\...............m.....y.....x......^.Q...j.....\S.....^.......l......]...[.......).....{....7...`..<...`..">..i.?/..@............>..Z.z@....0B..r...j.V.I.@..;%R...*...J.p.A.t.*..$A*...>`.....@g5BP.A..p.x.............q..8...... ...(.Q..#..@...F..YSK..M..#o.....D.m..-.....k}...BT..V......'.....`.d..~;..9+..6...<b.eZ..y^0]0..I...=.6.....}.0<.Z...M...Y1*35.e.....b...U0F~.-.HT......l2.s.q`-....y...e....dPZ....~.zT.M.... "r.E/k. ...*..Lj@'........Pcd&.(..mxF_w.."K..x!..--Y`..A.....Be.jH.A..\..j.....du#.....]^...>......].i.FMO..].9n1",Y...F...EW.9.....0TY.T...Cv!i`%...Hz@.]..U.!Y...#Dv&pi.z(.mn.A....@Q.0.%...&.4.v.cw(.`cd'|..M9..."...,*.......
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 89a, 48 x 75
                                                                                      Category:dropped
                                                                                      Size (bytes):1171
                                                                                      Entropy (8bit):7.289201491091023
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:DOfHIzP8hqiF+oyPOmp3XHhPBlMVvG0ffWLpfc:DGoPM+o0OmZXHhOv5WRc
                                                                                      MD5:7013CFC23ED23BFF3BDA4952266FA7F4
                                                                                      SHA1:E5B1DED49095332236439538ECD9DD0B1FD4934B
                                                                                      SHA-256:462A8FF8FD051A8100E8C6C086F497E4056ACE5B20B44791F4AAB964B010A448
                                                                                      SHA-512:A887A5EC33B82E4DE412564E86632D9A984E8498F02D8FE081CC4AC091A68DF6CC1A82F4BF99906CFB6EA9D0EF47ADAC2D1B0778DCB997FB24E62FC7A6D77D41
                                                                                      Malicious:false
                                                                                      Preview:GIF89a0.K.............................f.................f...ff.f3.f..33.3.........f..ff.f3.3f.33.3.f..ff.ff.f3ff333f.3f.33.33f.3......................................................................!.. -dl-.!.......,....0.K....@.pH,...GD.<:..%SR.Z......<.V.$l.....z......:.. .|v[D..f...z.W.G.Vr...NgsU.yl..qU..`.......`fe`.......Fg....(.&...g.Y.. .."..q.V.$.'.Ez.W....y...Y.U...(#Xrf.........Xux.U..........(U.4...X....G.B..t..1S...R..Y. ...l ..".>.h......,%K....A.....<s....#..8.iK.....a.y$h..DQh.PE)....6.....MyL.qzF..... ."..Y0..a......2..*t..Ma..b...M..R.....\..st..=....Q......,>s`....Qt.,..B.R.....!.$..%.....(...s...B.T...`,".h(. D....8..dC..\Q.p.......x.#A.....:..du..(D.XV......7....S.#n8a....2`...f.:G,...==(......`!..$...t....b..../N|...f..J.x... P&.|.d._!N...].1w.3D.0!....@o&H...N.B.J....pz8..w.i....=r.............@5.-!.......H."..[.j.AB<..p....h...V.D..6.h...ab1F.g...I !.V~.H..V.........:.G..|c...,.....TD5..c[.W.....LC.....FJ..71[..lH.M.....8.:$......
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:GIF image data, version 89a, 100 x 100
                                                                                      Category:dropped
                                                                                      Size (bytes):5473
                                                                                      Entropy (8bit):7.754239979431754
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:+EqG96vSGfyJZ26G6U1LI7nTD2enhjc+2VBnOqcUERVIim:+46KcyJI6G6uU7/LhjlkhQR7m
                                                                                      MD5:048AFE69735F6974D2CA7384B879820C
                                                                                      SHA1:267A9520C4390221DCE50177E789A4EBD590F484
                                                                                      SHA-256:E538F8F4934CA6E1CE29416D292171F28E67DA6C72ED9D236BA42F37445EA41E
                                                                                      SHA-512:201DA67A52DADA3AE7C533DE49D3C08A9465F7AA12317A0AE90A8C9C04AA69A85EC00AF2D0069023CD255DDA8768977C03C73516E4848376250E8D0D53D232CB
                                                                                      Malicious:false
                                                                                      Preview:GIF89ad.d...................RJJ...B99.......RBB..B11ZBB!....R991!!...)....{{B!!R)).JJ.ss.ZZ.BB.kk.RR.JJ.BB9...JJR!!.ZZ.BB.11.99.{s.sk.kc.cZ.ZR.JB.ZR.JB.JB.RJ.B9.91.B9...{.JB.91.B9.B9.1){)!.)!.9)..ZR.JB{91.cR{1).ZJ.ZJ.RB.J9.B1.B1.9).1!....{B9.{k.scc1).kZZ)!c)!.9).B1.9).9).1!.1!.1!.B).9!.9!.1..).....{.sZ1)R)!.B1.B1.ZBR!..9).ZB.9).R9.R9.1!.J1.J1.B).B).9!.9!.1..1..).....sZ.J9.ZB.cJJ!.{1!.B).9!{)..9!.J).B!.B!.9..R1).kJ)!.B1{9).R9.cB.Z9.Z9.B).Z9.B).R1.9!.R1.J).J).B!.1..9....{.s.J9.{Z.ZB.sR.kJk1!.cB.cB.R1.R).1..B!.J!.B.....R91.J1).c.kJ.J).Z1.B!.B!..9!..{R.sJ.Z9.R1{9!..s.R9.Z...J91Z9){B)...............B91..1)!..............................RJR............B)1......R19........BJ.9B..{..s{......!.......,....d.d.@............0@PHa....*.p...7.8.y...C.s6Z.%Q.#s.`:B.N....4jd.K.0..|y....F@.......1~ ......'Y.B"C&R.V.R.4$k.3...D.......Ef*Y3..M........BDV._.....\..).]..>s..$H\%y0WL...d.......D..'..v..1Kz.Zp$;S
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2267
                                                                                      Entropy (8bit):5.097909341674822
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:JlZuZcRTvy3DauG4+bHnr32s3eGw8YKxPiOXR3ojdS+mFf:JScFaz+bL3e8n3XR3ojdtOf
                                                                                      MD5:C88F99DECEC11AFA967AD33D314F87FE
                                                                                      SHA1:58769F631EB2C8DED0C274AB1D399085CC7AA845
                                                                                      SHA-256:2CDE822B93CA16AE535C954B7DFE658B4AD10DF2A193628D1B358F1765E8B198
                                                                                      SHA-512:4CD59971A2614891B2F0E24FD8A42A706AE10A2E54402D774E5DAA5F6A37DE186F1A45B1722A7C0174F9F80625B13D7C9F48FDB03A7DDBC6E6881F56537B5478
                                                                                      Malicious:false
                                                                                      Preview:This software is copyrighted by the Regents of the University of.California, Sun Microsystems, Inc., Scriptics Corporation, ActiveState.Corporation, Apple Inc. and other parties. The following terms apply to.all files associated with the software unless explicitly disclaimed in.individual files...The authors hereby grant permission to use, copy, modify, distribute,.and license this software and its documentation for any purpose, provided.that existing copyright notices are retained in all copies and that this.notice is included verbatim in any distributions. No written agreement,.license, or royalty fee is required for any of the authorized uses..Modifications to this software may be copyrighted by their authors.and need not follow the licensing terms described here, provided that.the new terms are clearly indicated on the first page of each file where.they apply...IN NO EVENT SHALL THE AUTHORS OR DISTRIBUTORS BE LIABLE TO ANY PARTY.FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQ
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):14594
                                                                                      Entropy (8bit):4.895853767062079
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:ZBjtAc4YusFvbg36UFchqHjNw8wSdy+1a22YDE/q:ZFgqUBjW8RQcf
                                                                                      MD5:C33963D3A512F2E728F722E584C21552
                                                                                      SHA1:75499CFA62F2DA316915FADA2580122DC3318BAD
                                                                                      SHA-256:39721233855E97BFA508959B6DD91E1924456E381D36FDFC845E589D82B1B0CC
                                                                                      SHA-512:EA01D8CB36D446ACE31C5D7E50DFAE575576FD69FD5D413941EEBBA7CCC1075F6774AF3C69469CD7BAF6E1068AA5E5B4C560F550EDD2A8679124E48C55C8E8D7
                                                                                      Malicious:false
                                                                                      Preview:# listbox.tcl --.#.# This file defines the default bindings for Tk listbox widgets.# and provides procedures that help in implementing those bindings..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994-1995 Sun Microsystems, Inc..# Copyright (c) 1998 by Scriptics Corporation..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#--------------------------------------------------------------------------.# tk::Priv elements used in this file:.#.# afterId -..Token returned by "after" for autoscanning..# listboxPrev -.The last element to be selected or deselected.#...during a selection operation..# listboxSelection -.All of the items that were selected before the.#...current selection operation (such as a mouse.#...drag) started; used to cancel an operation..#--------------------------------------------------------------------------..#-------------------------------------
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9569
                                                                                      Entropy (8bit):4.736161258754494
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:cp4NSZKF/bcaQTViJ8pox8tJRd/v0tAANQSLkROOp+4BQjBC:jSZKF/Iaarpocdn07NQS34ao
                                                                                      MD5:7176A4FE8EC3EA648854F1FC1BB2EA89
                                                                                      SHA1:28D96419585881C6222BC917EDB9A5863E7C519B
                                                                                      SHA-256:D454FC4E25D9DFC704556A689A17AA6F3D726F99592995952BC6492FC8F19F6E
                                                                                      SHA-512:8C33E1CD3490945DDC5DA0585E655A7FC78C9950886F68C096D103AE510C1024632AB3D41E9573937BB4359D365FFB8F5A10B1CA7BFBD37442F40985107C1C8D
                                                                                      Malicious:false
                                                                                      Preview:# megawidget.tcl.#.#.Basic megawidget support classes. Experimental for any use other than.#.the ::tk::IconList megawdget, which is itself only designed for use in.#.the Unix file dialogs..#.# Copyright (c) 2009-2010 Donal K. Fellows.#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES..#..package require Tk 8.6...::oo::class create ::tk::Megawidget {. superclass ::oo::class. method unknown {w args} {..if {[string match .* $w]} {.. [self] create $w {*}$args.. return $w..}..next $w {*}$args. }. unexport new unknown. self method create {name superclasses body} {..next $name [list \...superclass ::tk::MegawidgetClass {*}$superclasses]\;$body. }.}..::oo::class create ::tk::MegawidgetClass {. variable w hull options IdleCallbacks. constructor args {..# Extract the "widget name" from the object name..set w [namespace tail [self]]...# Configure things..tclParseConfigSpec [my varname op
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):38077
                                                                                      Entropy (8bit):4.872052715667624
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:0K5IzCPGH0a9tVbQDBTo06DpSCeihpzuxdyQYEuH9DAe1:0K5i1HDE6AWuxdRYxHS8
                                                                                      MD5:181ED74919F081EEB34269500E228470
                                                                                      SHA1:953EB429F6D98562468327858ED0967BDC21B5AD
                                                                                      SHA-256:564AC0040176CC5744E3860ABC36B5FFBC648DA20B26A710DC3414EAE487299B
                                                                                      SHA-512:220E496B464575115BAF1DEDE838E70D5DDD6D199B5B8ACC1763E66D66801021B2D7CD0E1E1846868782116AD8A1F127682073D6EACD7E73F91BCED89F620109
                                                                                      Malicious:false
                                                                                      Preview:# menu.tcl --.#.# This file defines the default bindings for Tk menus and menubuttons..# It also implements keyboard traversal of menus and implements a few.# other utility procedures related to menus..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 1998-1999 by Scriptics Corporation..# Copyright (c) 2007 Daniel A. Steffen <das@users.sourceforge.net>.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# Elements of tk::Priv that are used in this file:.#.# cursor -..Saves the -cursor option for the posted menubutton..# focus -..Saves the focus during a menu selection operation..#...Focus gets restored here when the menu is unposted..# grabGlobal -..Used in conjunction with tk::Priv(oldGrab): if.#...tk::Priv(oldGrab) is non-empty, then tk::Pr
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):29352
                                                                                      Entropy (8bit):5.110577585375791
                                                                                      Encrypted:false
                                                                                      SSDEEP:768:hmie+xwcBO/SHAqFySrhkvQueYpx8DPF52qdREXXZ2/OODi:I+xwcBO/SHAqFySrhAQueYD8D95TOL
                                                                                      MD5:5F3793E7E582111C17C85E23194AEFD5
                                                                                      SHA1:925D973B70252384D1DE9B388C6C2038E646FDDF
                                                                                      SHA-256:0AC9D11D4046EF4D8E6D219F6941BF69C6AE448C6A1C2F7FC382F84B5786F660
                                                                                      SHA-512:2922546BA69232DBC205FE83EF54916E334E7AC93B7A26A208341F9C101209DA84C73F48C52BDB8E63E71A545853652B86378EBEB88F000BC16FCFB0EF5D8517
                                                                                      Malicious:false
                                                                                      Preview:# mkpsenc.tcl --.#.# This file generates the postscript prolog used by Tk...namespace eval ::tk {. # Creates Postscript encoding vector for ISO-8859-1 (could theoretically. # handle any 8-bit encoding, but Tk never generates characters outside. # ASCII).. #. proc CreatePostscriptEncoding {} {..variable psglyphs..# Now check for known. Even if it is known, it can be other than we..# need. GhostScript seems to be happy with such approach..set result "\[\n"..for {set i 0} {$i<256} {incr i 8} {.. for {set j 0} {$j<8} {incr j} {...set enc [encoding convertfrom "iso8859-1" \....[format %c [expr {$i+$j}]]]...catch {... set hexcode {}... set hexcode [format %04X [scan $enc %c]]...}...if {[info exists psglyphs($hexcode)]} {... append result "/$psglyphs($hexcode)"...} else {... append result "/space"...}.. }.. append result "\n"..}..append result "\]"..return $result. }.. # List of adobe glyph names. Converted from glyphlist.txt, downloaded from. # Ad
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:xbm image (32x, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):16527
                                                                                      Entropy (8bit):4.679051291122852
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:aWsDPYblrrfcRcfjAwnAVDTS3ifQjvwMXEcjY:aTRcfjAwGTfQjvPXt0
                                                                                      MD5:C93F295967350F7010207874992E01A5
                                                                                      SHA1:CAE8EF749F7618326B3307DA7ED6DEBB380286DD
                                                                                      SHA-256:52C5B87C99C142D5FC77E0C22B78B7CD63A4861756FD6B39648A2E9A8EDDE953
                                                                                      SHA-512:F7E60211C0BC1ECEDE03022D622C5B9AAEAE3C203A60B6B034E1886F857C8FAD6BA6B1F7BA1EE7D733720775E7108F1BFD4C5B54A0F4919CE4EB43851D1190F8
                                                                                      Malicious:false
                                                                                      Preview:# msgbox.tcl --.#.#.Implements messageboxes for platforms that do not have native.#.messagebox support..#.# Copyright (c) 1994-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# Ensure existence of ::tk::dialog namespace.#.namespace eval ::tk::dialog {}..image create bitmap ::tk::dialog::b1 -foreground black \.-data "#define b1_width 32\n#define b1_height 32.static unsigned char q1_bits[] = {. 0x00, 0xf8, 0x1f, 0x00, 0x00, 0x07, 0xe0, 0x00, 0xc0, 0x00, 0x00, 0x03,. 0x20, 0x00, 0x00, 0x04, 0x10, 0x00, 0x00, 0x08, 0x08, 0x00, 0x00, 0x10,. 0x04, 0x00, 0x00, 0x20, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,. 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80, 0x01, 0x00, 0x00, 0x80,. 0x01, 0x00, 0x00, 0x80, 0x02, 0x00, 0x00, 0x40, 0x02, 0x00, 0x00, 0x40,. 0x04, 0x00, 0x00, 0x20, 0x08, 0x00,
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4158
                                                                                      Entropy (8bit):4.744283779865612
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:RC98Kz+4GgKafRXwSl51gmJnANlsgPVG5QOFWQfl5:RC98/4PGi51gmAsgPVjm5
                                                                                      MD5:EBAFA3EE899EBB06D52C204493CEE27A
                                                                                      SHA1:95E6C71E4525A8DD91E488B952665AE9C5FBDDED
                                                                                      SHA-256:D1B0FED0BEA51B3FAF08D8634034C7388BE7148F9B807460B7D185706DB8416F
                                                                                      SHA-512:ADDE3C85A7A4148BAFD6C8B8902FC8C229F1D1AAF118BE85F44E4667237E66938864E2B7B4486B7C68C89EB4559F1D8367F9F563B9C6C8BCAB66118B36E670B8
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset cs "&Abort" "&P\u0159eru\u0161it". ::msgcat::mcset cs "&About..." "&O programu...". ::msgcat::mcset cs "All Files" "V\u0161echny soubory". ::msgcat::mcset cs "Application Error" "Chyba programu". ::msgcat::mcset cs "Bold Italic". ::msgcat::mcset cs "&Blue" "&Modr\341". ::msgcat::mcset cs "Cancel" "Zru\u0161it". ::msgcat::mcset cs "&Cancel" "&Zru\u0161it". ::msgcat::mcset cs "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nemohu zm\u011bnit atku\341ln\355 adres\341\u0159 na \"%1\$s\".\nP\u0159\355stup odm\355tnut.". ::msgcat::mcset cs "Choose Directory" "V\375b\u011br adres\341\u0159e". ::msgcat::mcset cs "Cl&ear" "Sma&zat". ::msgcat::mcset cs "&Clear Console" "&Smazat konzolu". ::msgcat::mcset cs "Color" "Barva". ::msgcat::mcset cs "Console" "Konzole". ::msgcat::mcset cs "&Copy" "&Kop\355rovat". ::msgcat::mcset cs "Cu&t" "V&y\u0159\355znout". ::msgcat::mcset cs "&Delete" "&Smazat"
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3909
                                                                                      Entropy (8bit):4.6030170761850915
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:G8ONjSf5s80vWCUx5kTvgXTfODYE9lAUt:G8OmB0ZUx5kTv4sbt
                                                                                      MD5:C414C6972F0AAD5DFA31297919D0587F
                                                                                      SHA1:529AE0B0CB9D1DBC7F8844F346149E151DE0A36B
                                                                                      SHA-256:85E6CEE6001927376725F91EAA55D17B3D9E38643E17755A42C05FE491C63BDE
                                                                                      SHA-512:0F2A777B9C3D6C525097E19D1CC4525E9BAF78E0CABF54DD693C64BC1FD4EA75402D906A8302489997BA83ABA5AFD7CA1DE30FFE0888CD19950F56A9D38B018A
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset da "&Abort" "&Afbryd". ::msgcat::mcset da "&About..." "&Om...". ::msgcat::mcset da "All Files" "Alle filer". ::msgcat::mcset da "Application Error" "Programfejl". ::msgcat::mcset da "&Blue" "&Bl\u00E5". ::msgcat::mcset da "Cancel" "Annuller". ::msgcat::mcset da "&Cancel" "&Annuller". ::msgcat::mcset da "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ikke skifte til katalog \"%1\$s\".\nIngen rettigheder.". ::msgcat::mcset da "Choose Directory" "V\u00E6lg katalog". ::msgcat::mcset da "Cl&ear" "&Ryd". ::msgcat::mcset da "&Clear Console" "&Ryd konsolen". ::msgcat::mcset da "Color" "Farve". ::msgcat::mcset da "Console" "Konsol". ::msgcat::mcset da "&Copy" "&Kopier". ::msgcat::mcset da "Cu&t" "Kli&p". ::msgcat::mcset da "&Delete" "&Slet". ::msgcat::mcset da "Details >>" "Detailer". ::msgcat::mcset da "Directory \"%1\$s\" does not exist." "Katalog \"%1\$s\" findes ikke.". ::msg
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4823
                                                                                      Entropy (8bit):4.5738552657551566
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:13LquGgagtG6vz8MFi9dDvbwKAN92qqMXg07Qt:L1/w5jwKYH1Et
                                                                                      MD5:07DF877A1166E81256273F1183B5BDC9
                                                                                      SHA1:CB455F910208E2E55B27A96ABD845FEEDA88711A
                                                                                      SHA-256:06DD7572626DF5CB0A8D3AFFBAC9BB74CB12469076836D66FD19AE5B5FAB42C7
                                                                                      SHA-512:197B09F37647D1D5130A084EA1D99D0CC16C815EC0AC31EC07875BEB2DFAE2197E2AF3E323FE8CB35F90912D76D3EB88D1E56F6E026F87AEDFADB7534BA2675A
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset de "&Abort" "&Abbruch". ::msgcat::mcset de "&About..." "&\u00dcber...". ::msgcat::mcset de "All Files" "Alle Dateien". ::msgcat::mcset de "Application Error" "Applikationsfehler". ::msgcat::mcset de "&Apply" "&Anwenden". ::msgcat::mcset de "Bold" "Fett". ::msgcat::mcset de "Bold Italic" "Fett kursiv". ::msgcat::mcset de "&Blue" "&Blau". ::msgcat::mcset de "Cancel" "Abbruch". ::msgcat::mcset de "&Cancel" "&Abbruch". ::msgcat::mcset de "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kann nicht in das Verzeichnis \"%1\$s\" wechseln.\nKeine Rechte vorhanden.". ::msgcat::mcset de "Choose Directory" "W\u00e4hle Verzeichnis". ::msgcat::mcset de "Cl&ear" "&R\u00fccksetzen". ::msgcat::mcset de "&Clear Console" "&Konsole l\u00f6schen". ::msgcat::mcset de "Color" "Farbe". ::msgcat::mcset de "Console" "Konsole". ::msgcat::mcset de "&Copy" "&Kopieren". ::msgcat::mcset de "Cu&t" "Aus&schneid
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text, with very long lines (355)
                                                                                      Category:dropped
                                                                                      Size (bytes):8698
                                                                                      Entropy (8bit):4.296709418881547
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:tCrF5o/cmSHbkI8+ETnFI3mC2hk9I+c6M30UPfMNDz91yBFkm5w+kGR8MOFiL0xu:wp5RmSHlsFerVIfM5Loam5VOMAkV
                                                                                      MD5:C802EA5388476451CD76934417761AA6
                                                                                      SHA1:25531DF6262E3B1170055735C5A874B9124FEA83
                                                                                      SHA-256:1D56D0A7C07D34BB8165CBA47FA49351B8BC5A9DB244290B9601C5885D16155C
                                                                                      SHA-512:251FABBE8B596C74BC1231823C60F5F99CF55A29212327723F5DBE604F678E8E464F2D604D1049754B7C02350712B83BCF4D9542D8167F3CAB9C9B7E5C88EC7D
                                                                                      Malicious:false
                                                                                      Preview:## Messages for the Greek (Hellenic - "el") language..## Please report any changes/suggestions to:.## petasis@iit.demokritos.gr..namespace eval ::tk {. ::msgcat::mcset el "&Abort" "\u03a4\u03b5\u03c1\u03bc\u03b1\u03c4\u03b9\u03c3\u03bc\u03cc\u03c2". ::msgcat::mcset el "About..." "\u03a3\u03c7\u03b5\u03c4\u03b9\u03ba\u03ac...". ::msgcat::mcset el "All Files" "\u038c\u03bb\u03b1 \u03c4\u03b1 \u0391\u03c1\u03c7\u03b5\u03af\u03b1". ::msgcat::mcset el "Application Error" "\u039b\u03ac\u03b8\u03bf\u03c2 \u0395\u03c6\u03b1\u03c1\u03bc\u03bf\u03b3\u03ae\u03c2". ::msgcat::mcset el "&Blue" "\u039c\u03c0\u03bb\u03b5". ::msgcat::mcset el "&Cancel" "\u0391\u03ba\u03cd\u03c1\u03c9\u03c3\u03b7". ::msgcat::mcset el \."Cannot change to the directory \"%1\$s\".\nPermission denied." \."\u0394\u03b5\u03bd \u03b5\u03af\u03bd\u03b1\u03b9 \u03b4\u03c5\u03bd\u03b1\u03c4\u03ae \u03b7 \u03b1\u03bb\u03bb\u03b1\u03b3\u03ae \u03ba\u
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3286
                                                                                      Entropy (8bit):4.214322279125194
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:sqHa4IUXCtvLPgyq1+1ylnJzqFtC2NAXSxFFRRTDubLorIlnB:d64I5tDPgDNnH2SXSZRRTDuPZlB
                                                                                      MD5:64725ED622DBF1CB3F00479BA84157D7
                                                                                      SHA1:575429AEABAF6640425AC1BC397B3382C1ED1122
                                                                                      SHA-256:673C76A48ADA09A154CB038534BF90E3B9C0BA5FD6B1619DB33507DE65553362
                                                                                      SHA-512:4EBDCAB20D095789BB8D94476CCFD29DEE8DFCF96F1C2030387F0521827A140E22BBB0DAD4B73EABE26D70E1642C9981BC5CBBF0045FEABB9EF98C7CDB67795E
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset en "&Abort". ::msgcat::mcset en "&About...". ::msgcat::mcset en "All Files". ::msgcat::mcset en "Application Error". ::msgcat::mcset en "&Apply". ::msgcat::mcset en "Bold". ::msgcat::mcset en "Bold Italic". ::msgcat::mcset en "&Blue". ::msgcat::mcset en "Cancel". ::msgcat::mcset en "&Cancel". ::msgcat::mcset en "Cannot change to the directory \"%1\$s\".\nPermission denied.". ::msgcat::mcset en "Choose Directory". ::msgcat::mcset en "Cl&ear". ::msgcat::mcset en "&Clear Console". ::msgcat::mcset en "Color". ::msgcat::mcset en "Console". ::msgcat::mcset en "&Copy". ::msgcat::mcset en "Cu&t". ::msgcat::mcset en "&Delete". ::msgcat::mcset en "Details >>". ::msgcat::mcset en "Directory \"%1\$s\" does not exist.". ::msgcat::mcset en "&Directory:". ::msgcat::mcset en "&Edit". ::msgcat::mcset en "Effects". ::msgcat::mcset en "Error: %1\$s". ::msgcat::mcset en "E&xit". ::msgcat
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):63
                                                                                      Entropy (8bit):4.185724027617087
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:fEGp6fR1FAGoW8vMKEQXK:sooLoQO6
                                                                                      MD5:EC6A7E69AB0B8B767367DB54CC0499A8
                                                                                      SHA1:6C2D6B622429AB8C17E07C2E0F546469823ABE57
                                                                                      SHA-256:FB93D455A9D9CF3F822C968DFB273ED931E433F2494D71D6B5F8D83DDE7EACC2
                                                                                      SHA-512:72077EAB988979EB2EE292ACDB72537172A5E96B4262CE7278B76F0FEBD7E850D18221DB551D1DE3C6EB520985B5E9642936BEEB66032F920593276784525702
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset en_gb Color Colour.}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3916
                                                                                      Entropy (8bit):4.556739397782912
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:9714zhrzeU10xrFf+/eR0Mqp+cIFIXd/KcrtCcuUc6Sq4Pe:97145eFrF2GSMqgcIFIXdyAene
                                                                                      MD5:09EF4B30B49A71FD4DEA931E334896E1
                                                                                      SHA1:6C2366CE5961CFDA53259A43E087A813CEE41841
                                                                                      SHA-256:5DE113DC4CE0DF0D8C54D4812C15EC31387127BF9AFEA028D20C6A5AA8E3AB85
                                                                                      SHA-512:9DB3BB6B76B1299AE4612DF2A2872ECEE6642FC7DF971BE3A22437154AD25E81E1B1F3E1AA7A281CB3F48F8F8198A846BCB008CCFF91A9720440AFE5BAB7DE84
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset eo "&Abort" "&\u0108esigo". ::msgcat::mcset eo "&About..." "Pri...". ::msgcat::mcset eo "All Files" "\u0108ioj dosieroj". ::msgcat::mcset eo "Application Error" "Aplikoerraro". ::msgcat::mcset eo "&Blue" "&Blua". ::msgcat::mcset eo "Cancel" "Rezignu". ::msgcat::mcset eo "&Cancel" "&Rezignu". ::msgcat::mcset eo "Cannot change to the directory \"%1\$s\".\nPermission denied." "Neeble \u0109angi al dosierulon \"%1\$s\".\nVi ne rajtas tion.". ::msgcat::mcset eo "Choose Directory" "Elektu Dosierujo". ::msgcat::mcset eo "Cl&ear" "&Klaru". ::msgcat::mcset eo "&Clear Console" "&Klaru konzolon". ::msgcat::mcset eo "Color" "Farbo". ::msgcat::mcset eo "Console" "Konzolo". ::msgcat::mcset eo "&Copy" "&Kopiu". ::msgcat::mcset eo "Cu&t" "&Enpo\u015digu". ::msgcat::mcset eo "&Delete" "&Forprenu". ::msgcat::mcset eo "Details >>" "Detaloj >>". ::msgcat::mcset eo "Directory \"%1\$s\" does not exist." "La dosieruj
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3948
                                                                                      Entropy (8bit):4.486102294561867
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:vTaZD2XRgGiWXirZe0uoH02QyTaBi2DcDmQ/jY33l4TCyFv:vmZaXhFbyGB3ELjDV
                                                                                      MD5:93FFA957E3DCF851DD7EBE587A38F2D5
                                                                                      SHA1:8C3516F79FB72F32848B40091DA67C81E40FDEFE
                                                                                      SHA-256:91DC4718DC8566C36E4BCD0C292C01F467CA7661EFF601B870ABCDFE4A94ECBB
                                                                                      SHA-512:8EC7048DDFF521DE444F697EAB305777BAC24AEA37716DA4FE5374E93CEF66DDD58D535BE8FCBCD2636D623337643B1242798BB8AC7292EA2D81AE030C3A605C
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset es "&Abort" "&Abortar". ::msgcat::mcset es "&About..." "&Acerca de ...". ::msgcat::mcset es "All Files" "Todos los archivos". ::msgcat::mcset es "Application Error" "Error de la aplicaci\u00f3n". ::msgcat::mcset es "&Blue" "&Azul". ::msgcat::mcset es "Cancel" "Cancelar". ::msgcat::mcset es "&Cancel" "&Cancelar". ::msgcat::mcset es "Cannot change to the directory \"%1\$s\".\nPermission denied." "No es posible acceder al directorio \"%1\$s\".\nPermiso denegado.". ::msgcat::mcset es "Choose Directory" "Elegir directorio". ::msgcat::mcset es "Cl&ear" "&Borrar". ::msgcat::mcset es "&Clear Console" "&Borrar consola". ::msgcat::mcset es "Color". ::msgcat::mcset es "Console" "Consola". ::msgcat::mcset es "&Copy" "&Copiar". ::msgcat::mcset es "Cu&t" "Cor&tar". ::msgcat::mcset es "&Delete" "&Borrar". ::msgcat::mcset es "Details >>" "Detalles >>". ::msgcat::mcset es "Directory \"%1\$s\" does not exist." "
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3805
                                                                                      Entropy (8bit):4.582498923493114
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:fiESNtfQIFBqFHjUp4KiOzbgRuhzSAEFlBGr3jd:fiESP1aVdKiHRXcN
                                                                                      MD5:9FC55235C334F6F6026D5B38AFFB9E10
                                                                                      SHA1:CAD3805900E860B9491E3EE5C2C0F52ADCA67065
                                                                                      SHA-256:0A8BBB4D1FD87BF7A90DDFA50F4724994C9CE78D1F3E91CF40C1177DB7941DC5
                                                                                      SHA-512:FBB5E72BC376DDB9F43B8C79398CA287AFAAAF8292A8CB3AF63241973B1748FD578D49075A1287DA054BA81D3ED61A723F3DE9E10855D5E85620B371D70D9BBD
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset fr "&Abort" "&Annuler". ::msgcat::mcset fr "About..." "\u00c0 propos...". ::msgcat::mcset fr "All Files" "Tous les fichiers". ::msgcat::mcset fr "Application Error" "Erreur d'application". ::msgcat::mcset fr "&Blue" "&Bleu". ::msgcat::mcset fr "Cancel" "Annuler". ::msgcat::mcset fr "&Cancel" "&Annuler". ::msgcat::mcset fr "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossible d'acc\u00e9der au r\u00e9pertoire \"%1\$s\".\nPermission refus\u00e9e.". ::msgcat::mcset fr "Choose Directory" "Choisir r\u00e9pertoire". ::msgcat::mcset fr "Cl&ear" "Effacer". ::msgcat::mcset fr "Color" "Couleur". ::msgcat::mcset fr "Console". ::msgcat::mcset fr "Copy" "Copier". ::msgcat::mcset fr "Cu&t" "Couper". ::msgcat::mcset fr "Delete" "Effacer". ::msgcat::mcset fr "Details >>" "D\u00e9tails >>". ::msgcat::mcset fr "Directory \"%1\$s\" does not exist." "Le r\u00e9pertoire \"%1\$s\" n'existe pas.".
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4600
                                                                                      Entropy (8bit):4.752507976327236
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:IYIzxGy0Kt9C81y/HSzVqUaJf9q/x5a/mETsN:IB1FCt/4vZM+EA
                                                                                      MD5:E1BA9C40A350BAD78611839A59065BF0
                                                                                      SHA1:1A148D230C9F8D748D96A79CD4E261AF264D6524
                                                                                      SHA-256:C8134EAD129E44E9C5043E1DAD81A6A900F0DE71DB3468E2603840038687F1D8
                                                                                      SHA-512:17EC7F14C708C4D8C77731C26D0CE8AF6EBAB3D1CA878FB9682F15F0546031E39EF601683832631CA329549A630F2C9A3A69B1CC6E3CC927353605834FC62CAE
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset hu "&Abort" "&Megszak\u00edt\u00e1s". ::msgcat::mcset hu "&About..." "N\u00e9vjegy...". ::msgcat::mcset hu "All Files" "Minden f\u00e1jl". ::msgcat::mcset hu "Application Error" "Alkalmaz\u00e1s hiba". ::msgcat::mcset hu "&Blue" "&K\u00e9k". ::msgcat::mcset hu "Cancel" "M\u00e9gsem". ::msgcat::mcset hu "&Cancel" "M\u00e9g&sem". ::msgcat::mcset hu "Cannot change to the directory \"%1\$s\".\nPermission denied." "A k\u00f6nyvt\u00e1rv\u00e1lt\u00e1s nem siker\u00fclt: \"%1\$s\".\nHozz\u00e1f\u00e9r\u00e9s megtagadva.". ::msgcat::mcset hu "Choose Directory" "K\u00f6nyvt\u00e1r kiv\u00e1laszt\u00e1sa". ::msgcat::mcset hu "Cl&ear" "T\u00f6rl\u00e9s". ::msgcat::mcset hu "&Clear Console" "&T\u00f6rl\u00e9s Konzol". ::msgcat::mcset hu "Color" "Sz\u00edn". ::msgcat::mcset hu "Console" "Konzol". ::msgcat::mcset hu "&Copy" "&M\u00e1sol\u00e1s". ::msgcat::mcset hu "Cu&t" "&Kiv\u00e1g\u00e1s". ::msgcat::mcset hu "
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3692
                                                                                      Entropy (8bit):4.444986253861924
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:rtcxronR9zvjZ3hWsH9TYT/dllvOr80nC2dnGHc839kUqg:xcxoXBhlHiT/dlcY0HpVg
                                                                                      MD5:ADB80EC5B23FC906A1A3313A30D789E6
                                                                                      SHA1:5FB163BC1086D3366228204078F219FE4BB67CB3
                                                                                      SHA-256:9F83DD0309ED621100F3187FFCDAE50B75F5973BBE74AF550A78EF0010495DED
                                                                                      SHA-512:BA6E0C165561CDAEAB565EF1FED4087AB3B41EC3C18432C1BDA9B011E5C7C2E12F6B2CFC9F5C0CFAC1134AE53D80459D8E5B638739C61A851232047DEA7F3BA2
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset it "&Abort" "&Interrompi". ::msgcat::mcset it "&About..." "Informazioni...". ::msgcat::mcset it "All Files" "Tutti i file". ::msgcat::mcset it "Application Error" "Errore dell' applicazione". ::msgcat::mcset it "&Blue" "&Blu". ::msgcat::mcset it "Cancel" "Annulla". ::msgcat::mcset it "&Cancel" "&Annulla". ::msgcat::mcset it "Cannot change to the directory \"%1\$s\".\nPermission denied." "Impossibile accedere alla directory \"%1\$s\".\nPermesso negato.". ::msgcat::mcset it "Choose Directory" "Scegli una directory". ::msgcat::mcset it "Cl&ear" "Azzera". ::msgcat::mcset it "&Clear Console" "Azzera Console". ::msgcat::mcset it "Color" "Colore". ::msgcat::mcset it "Console". ::msgcat::mcset it "&Copy" "Copia". ::msgcat::mcset it "Cu&t" "Taglia". ::msgcat::mcset it "Delete" "Cancella". ::msgcat::mcset it "Details >>" "Dettagli >>". ::msgcat::mcset it "Directory \"%1\$s\" does not exist." "La director
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4466
                                                                                      Entropy (8bit):4.472386382725933
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:791wMjS3Md15YNISfTMEu5KIXTLLBIafWUuvfbLnZj4gT7VT4k7BLyslwI6Blb4t:DVe3MX8ISUKYuXbLnZj4MRJhjSIO4t
                                                                                      MD5:B628EAFD489335ED620014B56821B792
                                                                                      SHA1:8F6AFF68B42B747D30870D6DA7E058294921406A
                                                                                      SHA-256:D3D07AAD792C0E83F4704B304931EA549D12CBB3D99A573D9815E954A5710707
                                                                                      SHA-512:C33D097D2897D20F75A197E30B859DC83C8B4E42F260150BC7205918779D77A8C2390BE65376622F6705C38ECDF6F14B6ABAD29EDE3DE79603025BBBC39BEBC7
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset nl "&Abort" "&Afbreken". ::msgcat::mcset nl "&About..." "Over...". ::msgcat::mcset nl "All Files" "Alle Bestanden". ::msgcat::mcset nl "Application Error" "Toepassingsfout". ::msgcat::mcset nl "&Apply" "Toepassen". ::msgcat::mcset nl "Bold" "Vet". ::msgcat::mcset nl "Bold Italic" "Vet Cursief". ::msgcat::mcset nl "&Blue" "&Blauw". ::msgcat::mcset nl "Cancel" "Annuleren". ::msgcat::mcset nl "&Cancel" "&Annuleren". ::msgcat::mcset nl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan niet naar map \"%1\$s\" gaan.\nU heeft hiervoor geen toestemming.". ::msgcat::mcset nl "Choose Directory" "Kies map". ::msgcat::mcset nl "Cl&ear" "Wissen". ::msgcat::mcset nl "&Clear Console" "&Wis Console". ::msgcat::mcset nl "Color" "Kleur". ::msgcat::mcset nl "Console". ::msgcat::mcset nl "&Copy" "Kopi\u00ebren". ::msgcat::mcset nl "Cu&t" "Knippen". ::msgcat::mcset nl "&Delete" "Wissen". ::
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4841
                                                                                      Entropy (8bit):4.754441208797498
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:mYpnddv1H+BBv5vVXKjB+y7ldBU63XQ3DGHolytTzEQdWaz0ybBaKG:zpdzH+3vLKnG63XdHoMpYYaL
                                                                                      MD5:17B63EFE0A99F44D27DD41C4CC0A8A7B
                                                                                      SHA1:3E45C0102B287908D770A31D1906678E785088C2
                                                                                      SHA-256:1993B4EC2DC009D2E6CA185D0BD565D3F33A4EFA79BACA39E4F97F574D63F305
                                                                                      SHA-512:F8B9E7BC76A4ED5F948A9E505F3B1A321E322DD57CF88BEF36B6A9AF793462E45432709402151B4BB520B12B089A043CA23FF86106ED7B5C73DFBB6E233907F4
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset pl "&Abort" "&Przerwij". ::msgcat::mcset pl "&About..." "O programie...". ::msgcat::mcset pl "All Files" "Wszystkie pliki". ::msgcat::mcset pl "Application Error" "B\u0142\u0105d w programie". ::msgcat::mcset pl "&Apply" "Zastosuj". ::msgcat::mcset pl "Bold" "Pogrubienie". ::msgcat::mcset pl "Bold Italic" "Pogrubiona kursywa". ::msgcat::mcset pl "&Blue" "&Niebieski". ::msgcat::mcset pl "Cancel" "Anuluj". ::msgcat::mcset pl "&Cancel" "&Anuluj". ::msgcat::mcset pl "Cannot change to the directory \"%1\$s\".\nPermission denied." "Nie mo\u017cna otworzy\u0107 katalogu \"%1\$s\".\nOdmowa dost\u0119pu.". ::msgcat::mcset pl "Choose Directory" "Wybierz katalog". ::msgcat::mcset pl "Cl&ear" "&Wyczy\u015b\u0107". ::msgcat::mcset pl "&Clear Console" "&Wyczy\u015b\u0107 konsol\u0119". ::msgcat::mcset pl "Color" "Kolor". ::msgcat::mcset pl "Console" "Konsola". ::msgcat::mcset pl "&Copy" "&Kopiuj". ::msgcat::
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3913
                                                                                      Entropy (8bit):4.5841256573492135
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:k82mOQNHHouc2Ib2dxwj0Hpn4KeJ4iFHh29wDPK8+i92M5L:k82mOenox2x5Hp47mi3ZUMB
                                                                                      MD5:236356817E391D8871EA59667F47DA0C
                                                                                      SHA1:948EE95F4549DA8C7D412911D17B4B62CBA22ADD
                                                                                      SHA-256:AD0E466131D3789DE321D9D0588E19E4647BA82EDE41EEE6EBEF464786F8BDBE
                                                                                      SHA-512:3AB10D1980D4C1367EA0BB54E50709DF32A870E851EDE80F30F66DA4B09C1ACFFF4E77C462BD815DD67F485DDFF77FEBD09CA29D77EEE55FE8A00D115D600C32
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset pt "&Abort" "&Abortar". ::msgcat::mcset pt "About..." "Sobre ...". ::msgcat::mcset pt "All Files" "Todos os arquivos". ::msgcat::mcset pt "Application Error" "Erro de aplica\u00e7\u00e3o". ::msgcat::mcset pt "&Blue" "&Azul". ::msgcat::mcset pt "Cancel" "Cancelar". ::msgcat::mcset pt "&Cancel" "&Cancelar". ::msgcat::mcset pt "Cannot change to the directory \"%1\$s\".\nPermission denied." "N\u00e3o foi poss\u00edvel mudar para o diret\u00f3rio \"%1\$s\".\nPermiss\u00e3o negada.". ::msgcat::mcset pt "Choose Directory" "Escolha um diret\u00f3rio". ::msgcat::mcset pt "Cl&ear" "Apagar". ::msgcat::mcset pt "&Clear Console" "Apagar Console". ::msgcat::mcset pt "Color" "Cor". ::msgcat::mcset pt "Console". ::msgcat::mcset pt "&Copy" "Copiar". ::msgcat::mcset pt "Cu&t" "Recortar". ::msgcat::mcset pt "&Delete" "Excluir". ::msgcat::mcset pt "Details >>" "Detalhes >>". ::msgcat::mcset pt "Directory \"%1\$s\"
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7214
                                                                                      Entropy (8bit):4.358559144448363
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:ZUEBGTT4Ys7LT3xXkhF2xSrwFlOzFAn9E/j49cDRqRjGSQvN8Nfo5hgV9aWTRtaa:SraFGImk+4RKOGqRyRu
                                                                                      MD5:D7C27DBDF7B349BE13E09F35BA61A5F8
                                                                                      SHA1:40A52544B557F19736EA1767BFBF5708A9BBC318
                                                                                      SHA-256:C863DEBAB79F9682FD0D52D864E328E7333D03F4E9A75DBB342C30807EFDCFFB
                                                                                      SHA-512:DAF10336096B0574F060757CB6DD24049692F81B969B01BB8FA212035D955B8DA53F5ECDE3613E6AEF3C47165F075CC14363E4B854B2407EA452EAB4D4D31955
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset ru "&Abort" "&\u041e\u0442\u043c\u0435\u043d\u0438\u0442\u044c". ::msgcat::mcset ru "&About..." "\u041f\u0440\u043e...". ::msgcat::mcset ru "All Files" "\u0412\u0441\u0435 \u0444\u0430\u0439\u043b\u044b". ::msgcat::mcset ru "Application Error" "\u041e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435". ::msgcat::mcset ru "&Blue" " &\u0413\u043e\u043b\u0443\u0431\u043e\u0439". ::msgcat::mcset ru "Cancel" "\u041e\u0442&\u043c\u0435\u043d\u0430". ::msgcat::mcset ru "&Cancel" "\u041e\u0442&\u043c\u0435\u043d\u0430". ::msgcat::mcset ru "Cannot change to the directory \"%1\$s\".\nPermission denied." \...."\u041d\u0435 \u043c\u043e\u0433\u0443 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \"%1\$s\".\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0440\u0430\u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u0430".
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3832
                                                                                      Entropy (8bit):4.609382297476727
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:g4HXcfWBJdE10M4/00li6z8XIxTB2iDxypdmmZbWxOt:FXcf6H00li9IxTEbQsb7t
                                                                                      MD5:DB1712B1C1FF0E3A46F8E86FBB78AA4D
                                                                                      SHA1:28D9DB9CBEE791C09BD272D9C2A6C3DA80EB89EA
                                                                                      SHA-256:B76EBFA21BC1E937A04A04E5122BE64B5CDEE1F47C7058B71D8B923D70C3B17B
                                                                                      SHA-512:F79CD72DCD6D1B4212A5058DA5A020E8A157E72E6D84CAFB96463E76C1CED5AC367A2295EF743FDE70C9AB1CF2F4D88A4A73300DFD4F799AA3ECDA6FBF04E588
                                                                                      Malicious:false
                                                                                      Preview:namespace eval ::tk {. ::msgcat::mcset sv "&Abort" "&Avsluta". ::msgcat::mcset sv "&About..." "&Om...". ::msgcat::mcset sv "All Files" "Samtliga filer". ::msgcat::mcset sv "Application Error" "Programfel". ::msgcat::mcset sv "&Blue" "&Bl\u00e5". ::msgcat::mcset sv "Cancel" "Avbryt". ::msgcat::mcset sv "&Cancel" "&Avbryt". ::msgcat::mcset sv "Cannot change to the directory \"%1\$s\".\nPermission denied." "Kan ej n\u00e5 mappen \"%1\$s\".\nSaknar r\u00e4ttigheter.". ::msgcat::mcset sv "Choose Directory" "V\u00e4lj mapp". ::msgcat::mcset sv "Cl&ear" "&Radera". ::msgcat::mcset sv "&Clear Console" "&Radera konsollen". ::msgcat::mcset sv "Color" "F\u00e4rg". ::msgcat::mcset sv "Console" "Konsoll". ::msgcat::mcset sv "&Copy" "&Kopiera". ::msgcat::mcset sv "Cu&t" "Klipp u&t". ::msgcat::mcset sv "&Delete" "&Radera". ::msgcat::mcset sv "Details >>" "Detaljer >>". ::msgcat::mcset sv "Directory \"%1\$s\" does not exist." "Mappen \"%1\$s\" finns
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5594
                                                                                      Entropy (8bit):4.9941618573215525
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:oz4CrtmsXVwM3Er4VAEQ93NZB1o+IFF5ZYi4GUoLf33yLLddzA:oUCrtmsFREEs999o7FF5ZYi4GjLfS/d2
                                                                                      MD5:7763C90F811620A6C1F0A36BAF9B89CA
                                                                                      SHA1:30E24595DD683E470FE9F12814D27D6D266B511E
                                                                                      SHA-256:F6929A5E0D18BC4C6666206C63AC4AAA66EDC4B9F456DFC083300CFA95A44BCD
                                                                                      SHA-512:2E2887392C67D05EA85DB2E6BFD4AA27779BC82D3B607A7DD221A99EFF0D2A21A6BA47A4F2D2CDFC7CFECD7E93B2B38064C4D5A51406471AE142EC9CC71F5C48
                                                                                      Malicious:false
                                                                                      Preview:# obsolete.tcl --.#.# This file contains obsolete procedures that people really shouldn't.# be using anymore, but which are kept around for backward compatibility..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# The procedures below are here strictly for backward compatibility with.# Tk version 3.6 and earlier. The procedures are no longer needed, so.# they are no-ops. You should not use these procedures anymore, since.# they may be removed in some future release...proc tk_menuBar args {}.proc tk_bindForTraversal args {}..# ::tk::classic::restore --.#.# Restore the pre-8.5 (Tk classic) look as the widget defaults for classic.# Tk widgets..#.# The value following an 'option add' call is the new 8.5 value..#.namespace eval ::tk::classic {. # This may need to be adjusted for some windo
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1586
                                                                                      Entropy (8bit):4.733749898743743
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:k2hguC4Zxk+Z0cIWR3afbR1EIC+KtVa+6WX13jZQl9:k6T9N3atqIkeS9FQD
                                                                                      MD5:D17FE676A057F373B44C9197114F5A69
                                                                                      SHA1:9745C83EEC8565602F8D74610424848009FFA670
                                                                                      SHA-256:76DBDBF9216678D48D1640F8FD1E278E7140482E1CAC7680127A9A425CC61DEE
                                                                                      SHA-512:FF7D9EB64D4367BB11C567E64837CB1DAAA9BE0C8A498CAD00BF63AF45C1826632BC3A09E65D6F51B26EBF2D07285802813ED55C5D697460FC95AF30A943EF8F
                                                                                      Malicious:false
                                                                                      Preview:# optMenu.tcl --.#.# This file defines the procedure tk_optionMenu, which creates.# an option button and its associated menu..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# ::tk_optionMenu --.# This procedure creates an option button named $w and an associated.# menu. Together they provide the functionality of Motif option menus:.# they can be used to select one of many values, and the current value.# appears in the global variable varName, as well as in the text of.# the option menubutton. The name of the menu is returned as the.# procedure's result, so that the caller can use it to change configuration.# options on the menu or otherwise manipulate it..#.# Arguments:.# w -...The name to use for the menubutton..# varName -..Global variable to hold the currently selected value..# first
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8174
                                                                                      Entropy (8bit):4.9180898441277705
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:ZUW5yUd51URCJWgWWWuWVWUKoDOdnAjLDlJymGH91QOW86vkQI:ZLXaCI3dFUlPdnAP69W89
                                                                                      MD5:ABE618A0891CD6909B945A2098C77D75
                                                                                      SHA1:A322CCFB33FF73E4A4730B5B21DE4290F9D94622
                                                                                      SHA-256:60B8579368BB3063F16D25F007385111E0EF8D97BB296B03656DC176E351E3CA
                                                                                      SHA-512:2DF5A50F3CA7D21F43651651879BCAE1433FF44B0A7ECE349CCF73BECC4780160125B21F69348C97DCD60503FC79A6525DB723962197E8550B42D0AE257FD8E7
                                                                                      Malicious:false
                                                                                      Preview:# palette.tcl --.#.# This file contains procedures that change the color palette used.# by Tk..#.# Copyright (c) 1995-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# ::tk_setPalette --.# Changes the default color scheme for a Tk application by setting.# default colors in the option database and by modifying all of the.# color options for existing widgets that have the default value..#.# Arguments:.# The arguments consist of either a single color name, which.# will be used as the new background color (all other colors will.# be computed from this) or an even number of values consisting of.# option names and values. The name for an option is the one used.# for the option database, such as activeForeground, not -activeforeground...proc ::tk_setPalette {args} {. if {[winfo depth .] == 1} {..# Just return on monochrome displays, otherwise errors will occur..return. }.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5176
                                                                                      Entropy (8bit):4.933519639131517
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:PmpWHrga3awUrH6kdX3pBz6tkm71cHXYV23EmkiYlgfY8:+pWHrP36r6kJ3pBetkm6HXVUmPYlgfY8
                                                                                      MD5:2DA0A23CC9D6FD970FE00915EA39D8A2
                                                                                      SHA1:DFE3DC663C19E9A50526A513043D2393869D8F90
                                                                                      SHA-256:4ADF738B17691489C71C4B9D9A64B12961ADA8667B81856F7ADBC61DFFEADF29
                                                                                      SHA-512:B458F3D391DF9522D4E7EAE8640AF308B4209CE0D64FD490BFC0177FDE970192295C1EA7229CE36D14FC3E582C7649460B8B7B0214E0FF5629B2B430A99307D4
                                                                                      Malicious:false
                                                                                      Preview:# panedwindow.tcl --.#.# This file defines the default bindings for Tk panedwindow widgets and.# provides procedures that help in implementing those bindings...bind Panedwindow <Button-1> { ::tk::panedwindow::MarkSash %W %x %y 1 }.bind Panedwindow <Button-2> { ::tk::panedwindow::MarkSash %W %x %y 0 }..bind Panedwindow <B1-Motion> { ::tk::panedwindow::DragSash %W %x %y 1 }.bind Panedwindow <B2-Motion> { ::tk::panedwindow::DragSash %W %x %y 0 }..bind Panedwindow <ButtonRelease-1> {::tk::panedwindow::ReleaseSash %W 1}.bind Panedwindow <ButtonRelease-2> {::tk::panedwindow::ReleaseSash %W 0}..bind Panedwindow <Motion> { ::tk::panedwindow::Motion %W %x %y }..bind Panedwindow <Leave> { ::tk::panedwindow::Leave %W }..# Initialize namespace.namespace eval ::tk::panedwindow {}..# ::tk::panedwindow::MarkSash --.#.# Handle marking the correct sash for possible dragging.#.# Arguments:.# w..the widget.# x..widget local x coord.# y..widget local y coord.# proxy.whether this should be a prox
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):363
                                                                                      Entropy (8bit):4.977735142707899
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:Cjtl17nOJRVxTc6ynID/cL44ncleXNyLMQ9HECJBIQ08PbDMQ9HECJBIQem8:ot7rOJdg6LYUlVfBIUjjfBIFF
                                                                                      MD5:A6448AF2C8FAFC9A4F42EACA6BF6AB2E
                                                                                      SHA1:0B295B46B6DF906E89F40A907022068BC6219302
                                                                                      SHA-256:CD44EE7F76C37C0C522BD0CFCA41C38CDEDDC74392B2191A3AF1A63D9D18888E
                                                                                      SHA-512:5B1A8CA5B09B7281DE55460D21D5195C4EE086BEBDC35FA561001181490669FFC67D261F99EAA900467FE97E980EB733C5FFBF9D8C541EDE18992BF4A435C749
                                                                                      Malicious:false
                                                                                      Preview:if {[catch {package present Tcl 8.6.0}]} { return }.if {($::tcl_platform(platform) eq "unix") && ([info exists ::env(DISPLAY)]..|| ([info exists ::argv] && ("-display" in $::argv)))} {. package ifneeded Tk 8.6.9 [list load [file join $dir .. .. bin libtk8.6.dll] Tk].} else {. package ifneeded Tk 8.6.9 [list load [file join $dir .. .. bin tk86t.dll] Tk].}.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7381
                                                                                      Entropy (8bit):4.833263771361282
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:keEoaa0QfsimXZrjpgj47e5QeO9uMfUKvLAN6Zo:keEoRHsiWddgkoiUeG
                                                                                      MD5:EFC567E407C48BF2BE4E09CB18DEFC11
                                                                                      SHA1:EDEDB6776963B7D629C6ACE9440D24EB78DEA878
                                                                                      SHA-256:9708F5A1E81E1C3FEAF189020105BE28D27AA8808FF9FB2DCCA040500CF2642A
                                                                                      SHA-512:BDA5F92BD2F7B9CD29C5A732EC77A71291778A0EC3EABE81575C55DE3E207F663BA28DA4C95174045A74EFFF71B95D907C9D056BAA9E585E6F6DC14A133760BC
                                                                                      Malicious:false
                                                                                      Preview:# safetk.tcl --.#.# Support procs to use Tk in safe interpreters..#.# Copyright (c) 1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...# see safetk.n for documentation..#.#.# Note: It is now ok to let untrusted code being executed.# between the creation of the interp and the actual loading.# of Tk in that interp because the C side Tk_Init will.# now look up the master interp and ask its safe::TkInit.# for the actual parameters to use for it's initialization (if allowed),.# not relying on the slave state..#..# We use opt (optional arguments parsing).package require opt 0.4.1;..namespace eval ::safe {.. # counter for safe toplevels. variable tkSafeId 0.}..#.# tkInterpInit : prepare the slave interpreter for tk loading.# most of the real job is done by loadTk.# returns the slave name (tkInterpInit does).#.proc ::safe::tkInterpIni
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):7766
                                                                                      Entropy (8bit):4.933555104215445
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:q1xTLI9LUAp8cZIQ+Umuy9vYE2dLTaQfiwHZeABypyTtB:HUN1Umn2dKuHIpCB
                                                                                      MD5:1CE32CDAEB04C75BFCEEA5FB94B8A9F0
                                                                                      SHA1:CC7614C9EADE999963EE78B422157B7B0739894C
                                                                                      SHA-256:58C662DD3D2C653786B05AA2C88831F4E971B9105E4869D866FB6186E83ED365
                                                                                      SHA-512:1EE5A187615AE32F17936931B30FEA9551F9E3022C1F45A2BCA81624404F4E68022FCF0B03FBD61820EC6958983A8F2FBFC3AD2EC158433F8E8DE9B8FCF48476
                                                                                      Malicious:false
                                                                                      Preview:# scale.tcl --.#.# This file defines the default bindings for Tk scale widgets and provides.# procedures that help in implementing the bindings..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994-1995 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# The code below creates the default class bindings for entries..#-------------------------------------------------------------------------..# Standard Motif bindings:..bind Scale <Enter> {. if {$tk_strictMotif} {..set tk::Priv(activeBg) [%W cget -activebackground]..%W configure -activebackground [%W cget -background]. }. tk::ScaleActivate %W %x %y.}.bind Scale <Motion> {. tk::ScaleActivate %W %x %y.}.bind Scale <Leave> {. if {$tk_strictMotif} {..%W configure -activebackground $tk::Priv(activeBg). }.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):12748
                                                                                      Entropy (8bit):5.026700023745507
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:AfVS+eV9fKbBevrpQQtfJMZqSwiXEfY4yhIa7yLIVNpIgdWmD3T1gFpN:Pf4wTGOfmkSwORVqaGcV4q7kpN
                                                                                      MD5:4CBFFC4E6B3F56A5890E3F7C31C6C378
                                                                                      SHA1:75DB5205B311F55D1CA1D863B8688A628BF6012A
                                                                                      SHA-256:6BA3E2D62BD4856D7D7AE87709FCAA23D81EFC38C375C6C5D91639555A84C35D
                                                                                      SHA-512:65DF7AE09E06C200A8456748DC89095BB8417253E01EC4FDAFB28A84483147DDC77AAF6B49BE9E18A326A94972086A99044BEE3CE5CF8026337DFC6972C92C04
                                                                                      Malicious:false
                                                                                      Preview:# scrlbar.tcl --.#.# This file defines the default bindings for Tk scrollbar widgets..# It also provides procedures that help in implementing the bindings..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994-1996 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# The code below creates the default class bindings for scrollbars..#-------------------------------------------------------------------------..# Standard Motif bindings:.if {[tk windowingsystem] eq "x11" || [tk windowingsystem] eq "aqua"} {..bind Scrollbar <Enter> {. if {$tk_strictMotif} {..set tk::Priv(activeBg) [%W cget -activebackground]..%W configure -activebackground [%W cget -background]. }. %W activate [%W identify %x %y].}.bind Scrollbar <Motion> {. %W activate [%W identify %x %y].}..# The
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):15640
                                                                                      Entropy (8bit):5.001694129885997
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:aR1yvxxVRQRrclOniQ14Yvg5bbVFMio1UF9w9P75uaMY+c6RhO1ON6Ql4qRiZ0NO:MyF5XVF61iwZ75/YRhO464z8wdEt
                                                                                      MD5:9971530F110AC2FB7D7EC91789EA2364
                                                                                      SHA1:AB553213C092EF077524ED56FC37DA29404C79A7
                                                                                      SHA-256:5D6E939B44F630A29C4FCB1E2503690C453118607FF301BEF3C07FA980D5075A
                                                                                      SHA-512:81B4CEC39B03FBECA59781AA54960F0A10A09733634F401D5553E1AAA3EBF12A110C9D555946FCDD70A9CC897514663840745241AD741DC440BB081A12DCF411
                                                                                      Malicious:false
                                                                                      Preview:# spinbox.tcl --.#.# This file defines the default bindings for Tk spinbox widgets and provides.# procedures that help in implementing those bindings. The spinbox builds.# off the entry widget, so it can reuse Entry bindings and procedures..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 1999-2000 Jeffrey Hobbs.# Copyright (c) 2000 Ajuba Solutions.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# Elements of tk::Priv that are used in this file:.#.# afterId -..If non-null, it means that auto-scanning is underway.#...and it gives the "after" id for the next auto-scan.#...command to be executed..# mouseMoved -..Non-zero means the mouse has moved a significant.#...amount since the button went down (so, for example,.#...start dragging out a
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):20270
                                                                                      Entropy (8bit):4.749624735829406
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:edtm3fv2ZzffGIgowSDxD7n2s7AcBnaUuFyLWFot5gzSG3k96vNTWuoJnfOvWhbk:eds3fv2ZzffGIgowSDxD7nd7AcBnahFN
                                                                                      MD5:4AD192C43972A6A4834D1D5A7C511750
                                                                                      SHA1:09CA39647AA1C14DB16014055E48A9B0237639BA
                                                                                      SHA-256:8E8ECECFD6046FE413F37A91933EEA086E31959B3FBEB127AFDD05CD9141BE9A
                                                                                      SHA-512:287FAADBC6F65FCC3EA9C1EC10B190712BB36A06D28E59F8D268EA585B4E6B13494BA111DFF6AC2EBF998578999C9C36965C714510FC21A9ACB65FF9B75097CB
                                                                                      Malicious:false
                                                                                      Preview:# Tcl autoload index file, version 2.0.# This file is generated by the "auto_mkindex" command.# and sourced to set up indexing information for one or.# more commands. Typically each line is a command that.# sets an element in the auto_index array, where the.# element name is the name of a command and the value is.# a script that loads the command...set auto_index(::tk::dialog::error::Return) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::dialog::error::Details) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::dialog::error::SaveToLog) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::dialog::error::Destroy) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::dialog::error::bgerror) [list source [file join $dir bgerror.tcl]].set auto_index(bgerror) [list source [file join $dir bgerror.tcl]].set auto_index(::tk::ButtonInvoke) [list source [file join $dir button.tcl]].set auto_index(::tk::ButtonAutoInvoke) [list source [file join
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5142
                                                                                      Entropy (8bit):4.672280480827932
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:MgPXEnPQcTtD7zxeHK7ijhgdhAhbbjymL/KK2pLQY4QYNHL43EwzS6ejW:MgPUnPtTtFeqmjhgdhIbbjymL/KKeLQW
                                                                                      MD5:214FA0731A27E33826F2303750B64784
                                                                                      SHA1:C2DA41761FB7BAE38DDDEFA22AB57B337F54F5D8
                                                                                      SHA-256:FB6B35ECB1438BB8A2D816B86FB0C55500C6EA8D24AECB359CC3C7D3B3C54DE0
                                                                                      SHA-512:2E2A2412CBB090C0728333480B0E07C85087ED932974A235D5BC8C9725DE937520205D988872E1B5BEFA1E80201E046C500BC875A5CBD584A5099930EBBD115A
                                                                                      Malicious:false
                                                                                      Preview:# tearoff.tcl --.#.# This file contains procedures that implement tear-off menus..#.# Copyright (c) 1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..# ::tk::TearoffMenu --.# Given the name of a menu, this procedure creates a torn-off menu.# that is identical to the given menu (including nested submenus)..# The new torn-off menu exists as a toplevel window managed by the.# window manager. The return value is the name of the new menu..# The window is created at the point specified by x and y.#.# Arguments:.# w -...The menu to be torn-off (duplicated)..# x -...x coordinate where window is created.# y -...y coordinate where window is created..proc ::tk::TearOffMenu {w {x 0} {y 0}} {. # Find a unique name to use for the torn-off menu. Find the first. # ancestor of w that is a toplevel but not a menu,
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):33155
                                                                                      Entropy (8bit):4.908284262811967
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:ThZXGSuWlNGbyBFFRzGagUNKEFx8wredkG/gVVFaO/9bembFWaHnla98ffRiqiPp:TYaNGKF6uNdyO4Ona98ffRUAlde
                                                                                      MD5:03CC27E28E0CFCE1B003C3E936797AB0
                                                                                      SHA1:C7FE5AE7F35C86EC3724F6A111EAAF2C1A18ABE9
                                                                                      SHA-256:BCCC1039F0EB331C4BB6BD5848051BB745F242016952723478C93B009F63D254
                                                                                      SHA-512:5091B10EE8446E6853EF7060EC13AB8CADA0D6448F9081FEBD07546C061F69FC273BBF23BA7AF05D8359E618DD68A5C27F0453480FE3F26E744DB19BFCD115C7
                                                                                      Malicious:false
                                                                                      Preview:# text.tcl --.#.# This file defines the default bindings for Tk text widgets and provides.# procedures that help in implementing the bindings..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 1998 by Scriptics Corporation..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..#-------------------------------------------------------------------------.# Elements of ::tk::Priv that are used in this file:.#.# afterId -..If non-null, it means that auto-scanning is underway.#...and it gives the "after" id for the next auto-scan.#...command to be executed..# char -..Character position on the line; kept in order.#...to allow moving up or down past short lines while.#...still remembering the desired position..# mouseMoved -..Non-zero means the mouse has moved a significant.#...amount since the button went down (so, for exampl
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:Tcl script, ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):23142
                                                                                      Entropy (8bit):5.097142507145225
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:dmAlIQ7ylH462gngqeObubqLwvoGah0QSA4jLGn3WB0MCdPAWD+g190K5TzMSW4d:dmOIQulHokh0QzMemB0MCD+g1bk+
                                                                                      MD5:3250EC5B2EFE5BBE4D3EC271F94E5359
                                                                                      SHA1:6A0FE910041C8DF4F3CDC19871813792E8CC4E4C
                                                                                      SHA-256:E1067A0668DEBB2D8E8EC3B7BC1AEC3723627649832B20333F9369F28E4DFDBF
                                                                                      SHA-512:F8E403F3D59D44333BCE2AA7917E6D8115BEC0FE5AE9A1306F215018B05056467643B7AA228154DDCED176072BC903DFB556CB2638F5C55C1285C376079E8FE3
                                                                                      Malicious:false
                                                                                      Preview:# tk.tcl --.#.# Initialization script normally executed in the interpreter for each Tk-based.# application. Arranges class bindings for widgets..#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1996 Sun Microsystems, Inc..# Copyright (c) 1998-2000 Ajuba Solutions..#.# See the file "license.terms" for information on usage and redistribution of.# this file, and for a DISCLAIMER OF ALL WARRANTIES...# Verify that we have Tk binary and script components from the same release.package require -exact Tk 8.6.9...# Create a ::tk namespace.namespace eval ::tk {. # Set up the msgcat commands. namespace eval msgcat {..namespace export mc mcmax. if {[interp issafe] || [catch {package require msgcat}]} {. # The msgcat package is not available. Supply our own. # minimal replacement.. proc mc {src args} {. return [format $src {*}$args]. }. proc mcmax {args} {.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):38373
                                                                                      Entropy (8bit):5.143151103117394
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:a6NFLvIIaE2wCpxQYt/rJTkA3NN5YAGnk1c6gHZZgkO0Z6INfdpsaUpWz8ZlhL5S:akJ2wKFXuNzClMGH87f12Vb4
                                                                                      MD5:21985684C432CB918A3E862517842F75
                                                                                      SHA1:4DBACAEEF8454C1B08993D76857C5F09AA75405A
                                                                                      SHA-256:AE448DF6FDBBA45D450ABEFEF12799F8362177B0B9FE06F3CA3CB0EDA5E6AA58
                                                                                      SHA-512:AFEA6C47001455D7E40A5A7728FA4DFAD7BB66B02191E807BB15355847F5B265DEEE6015516807B10E1273710A3D03FAAC7856CB16EFA773813105B23A11960F
                                                                                      Malicious:false
                                                                                      Preview:# tkfbox.tcl --.#.#.Implements the "TK" standard file selection dialog box. This dialog.#.box is used on the Unix platforms whenever the tk_strictMotif flag is.#.not set..#.#.The "TK" standard file selection dialog box is similar to the file.#.selection dialog box on Win95(TM). The user can navigate the.#.directories by clicking on the folder icons or by selecting the.#."Directory" option menu. The user can select files by clicking on the.#.file icons or by entering a filename in the "Filename:" entry..#.# Copyright (c) 1994-1998 Sun Microsystems, Inc..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..namespace eval ::tk::dialog {}.namespace eval ::tk::dialog::file {. namespace import -force ::tk::msgcat::*. variable showHiddenBtn 0. variable showHiddenVar 1.. # Create the images if they did not already exist.. if {![info exists ::tk::Priv(updirImage)]} {..set ::tk::Priv(updirImage)
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3683
                                                                                      Entropy (8bit):4.872530668776095
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:xICsIX5RupDdMrwuQb8BQEQWQEQK9FVGQJFVGDusxzUFIG0usf2kGKQH+n5dvW8m:h7oFAzfphta9DwuTa
                                                                                      MD5:8FF9D357AF3806D997BB8654E95F530C
                                                                                      SHA1:62292163299CC229031BB4EAFBE900323056561A
                                                                                      SHA-256:E36864B33D7C2B47FE26646377BE86FB341BBF2B6DF13E33BD799E87D24FC193
                                                                                      SHA-512:ECDC47E7D1F0F9C0C052ACA2EB2DE10E78B2256E8DB85D7B52F365C1074A4E24CDB1C7A2780B36DFA36F174FF87B6A31C49F61CC0AC3D2412B3915234D911C9C
                                                                                      Malicious:false
                                                                                      Preview:#.# Ttk widget set: Alternate theme.#..namespace eval ttk::theme::alt {.. variable colors. array set colors {..-frame .."#d9d9d9"..-window.."#ffffff"..-darker ."#c3c3c3"..-border.."#414141"..-activebg ."#ececec"..-disabledfg."#a3a3a3"..-selectbg."#4a6984"..-selectfg."#ffffff"..-altindicator."#aaaaaa". }.. ttk::style theme settings alt {...ttk::style configure "." \.. -background .$colors(-frame) \.. -foreground .black \.. -troughcolor.$colors(-darker) \.. -bordercolor.$colors(-border) \.. -selectbackground .$colors(-selectbg) \.. -selectforeground .$colors(-selectfg) \.. -font ..TkDefaultFont \.. ;...ttk::style map "." -background \.. [list disabled $colors(-frame) active $colors(-activebg)] ;..ttk::style map "." -foreground [list disabled $colors(-disabledfg)] ;. ttk::style map "." -embossed [list disabled 1] ;...ttk::style configure TButton \.. -anchor center -width -11 -padding "1 1" \.. -relief raised -shiftrelief 1 \.. -highl
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2245
                                                                                      Entropy (8bit):4.988082031411997
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:tdlBlblITKleKgNX1gPc+JFzVPb9ZLJY2ZL7X0jX4:p51gRK7F9DzrMo
                                                                                      MD5:6466DBA5F7DDB28F280A24E2397DD875
                                                                                      SHA1:060C504D08B014EB388EFAF48E3720CE5D7F0132
                                                                                      SHA-256:CBC17D1C434CACD0AB42CDCC4D62ED193F926447189AD258C13738D4EC154A80
                                                                                      SHA-512:5FAAC1C5FC868DCE8B7A9431BEAEB8117ADDE5C752306CAD7B6FA8123758F2CF37FB1CF18CAC2934F7D07B14FAFCE01581BAD0CA952BFECFCBD9E1E26FF9A64C
                                                                                      Malicious:false
                                                                                      Preview:#.# Aqua theme (OSX native look and feel).#..namespace eval ttk::theme::aqua {. ttk::style theme settings aqua {...ttk::style configure . \.. -font TkDefaultFont \.. -background systemWindowBody \.. -foreground systemModelessDialogActiveText \.. -selectbackground systemHighlight \.. -selectforeground systemModelessDialogActiveText \.. -selectborderwidth 0 \.. -insertwidth 1...ttk::style map . \.. -foreground {disabled systemModelessDialogInactiveText... background systemModelessDialogInactiveText} \.. -selectbackground {background systemHighlightSecondary... !focus systemHighlightSecondary} \.. -selectforeground {background systemModelessDialogInactiveText... !focus systemDialogActiveText}...# Workaround for #1100117:..# Actually, on Aqua we probably shouldn't stipple images in..# disabled buttons even if it did work.....ttk::style configure . -stipple {}...ttk::style configure TButton -anchor center -width -6..ttk::style configure Toolbutton -
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2978
                                                                                      Entropy (8bit):4.8919006418640265
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:hpNRZ/rtWkRMC0ScGHsAEfKPi7K1MFNQ6z4Dvh8niT6CUI+SfRHThp:DNRZzse1cGH3UvKmFNQ6z2hT6CUI+4Hb
                                                                                      MD5:EA7CF40852AFD55FFDA9DB29A0E11322
                                                                                      SHA1:B7B42FAC93E250B54EB76D95048AC3132B10E6D8
                                                                                      SHA-256:391B6E333D16497C4B538A7BDB5B16EF11359B6E3B508D470C6E3703488E3B4D
                                                                                      SHA-512:123D78D6AC34AF4833D05814220757DCCF2A9AF4761FE67A8FE5F67A0D258B3C8D86ED346176FFB936AB3717CFD75B4FAB7373F7853D44FA356BE6E3A75E51B9
                                                                                      Malicious:false
                                                                                      Preview:#.# Bindings for Buttons, Checkbuttons, and Radiobuttons..#.# Notes: <Button1-Leave>, <Button1-Enter> only control the "pressed".# state; widgets remain "active" if the pointer is dragged out..# This doesn't seem to be conventional, but it's a nice way.# to provide extra feedback while the grab is active..# (If the button is released off the widget, the grab deactivates and.# we get a <Leave> event then, which turns off the "active" state).#.# Normally, <ButtonRelease> and <ButtonN-Enter/Leave> events are .# delivered to the widget which received the initial <ButtonPress>.# event. However, Tk [grab]s (#1223103) and menu interactions.# (#1222605) can interfere with this. To guard against spurious.# <Button1-Enter> events, the <Button1-Enter> binding only sets.# the pressed state if the button is currently active..#..namespace eval ttk::button {}..bind TButton <Enter> ..{ %W instate !disabled {%W state active} }.bind TButton <Leave>..{ %W state !active }.bind TButton <Key-space>.{ ttk:
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4742
                                                                                      Entropy (8bit):4.859511673200619
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:9zDTlU3tCKW3PiAu4UZQsk+EBSucCtCqM368CtTU/+xgxaYgxaf/sY2+rF5usxzk:ZuHjO7uCkqM3JCNU/igxNgxor2tpuTM
                                                                                      MD5:AA2987DC061DAA998B73A1AD937EE4BB
                                                                                      SHA1:33FE9DFA76FB08B9D8D5C3554D13482D330C2DB1
                                                                                      SHA-256:4ED0ACDD29FC1FB45C6BDC9EFB2CBADE34B93C45D5DBB269A4A4A3044CF4CB7A
                                                                                      SHA-512:5A83B1FC88E42BB1DAD60D89CD5F2193E6AB59C4902A6C727E0090D1F395C2F122521FDFF250A14109EE5113D5034319199FB260129416EA962559350F217A03
                                                                                      Malicious:false
                                                                                      Preview:#.# "Clam" theme..#.# Inspired by the XFCE family of Gnome themes..#..namespace eval ttk::theme::clam {. variable colors . array set colors {..-disabledfg.."#999999"..-frame .."#dcdad5"..-window .."#ffffff"..-dark..."#cfcdc8"..-darker .."#bab5ab"..-darkest.."#9e9a91"..-lighter.."#eeebe7"..-lightest .."#ffffff"..-selectbg.."#4a6984"..-selectfg.."#ffffff"..-altindicator.."#5895bc"..-disabledaltindicator."#a0a0a0". }.. ttk::style theme settings clam {...ttk::style configure "." \.. -background $colors(-frame) \.. -foreground black \.. -bordercolor $colors(-darkest) \.. -darkcolor $colors(-dark) \.. -lightcolor $colors(-lighter) \.. -troughcolor $colors(-darker) \.. -selectbackground $colors(-selectbg) \.. -selectforeground $colors(-selectfg) \.. -selectborderwidth 0 \.. -font TkDefaultFont \.. ;...ttk::style map "." \.. -background [list disabled $colors(-frame) \.... active $colors(-lighter)] \.. -foreground [list disabled $colors(
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3828
                                                                                      Entropy (8bit):4.892728136244756
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:yAJZjsTMw96Ey6kvzuVuby+x0M+x06uxjFVGQJFVGQuxzUFIGQutK2MRvD7J+iSz:yAJZ8MVJiVR+x/+xefVItuTy7Urt
                                                                                      MD5:7DBF35F3F0F9FB68626019FF94EFBCD3
                                                                                      SHA1:213F18224BF0573744836CD3BEDC83D5E443A406
                                                                                      SHA-256:30E6766E9B8292793395324E412B0F5A8888512B84B080E247F95BF6EFB11A9D
                                                                                      SHA-512:9081E5C89ECDE8337C5A52531DEF24924C0BCB3A1F0596D3B986CC59E635F67A78327ABF26209BF71A9BA370A93174298E6ABD11586382D7D70ADEA7E5CCF854
                                                                                      Malicious:false
                                                                                      Preview:#.# "classic" Tk theme..#.# Implements Tk's traditional Motif-like look and feel..#..namespace eval ttk::theme::classic {.. variable colors; array set colors {..-frame.."#d9d9d9"..-window.."#ffffff"..-activebg."#ececec"..-troughbg."#c3c3c3"..-selectbg."#c3c3c3"..-selectfg."#000000"..-disabledfg."#a3a3a3"..-indicator."#b03060"..-altindicator."#b05e5e". }.. ttk::style theme settings classic {..ttk::style configure "." \.. -font..TkDefaultFont \.. -background..$colors(-frame) \.. -foreground..black \.. -selectbackground.$colors(-selectbg) \.. -selectforeground.$colors(-selectfg) \.. -troughcolor.$colors(-troughbg) \.. -indicatorcolor.$colors(-frame) \.. -highlightcolor.$colors(-frame) \.. -highlightthickness.1 \.. -selectborderwidth.1 \.. -insertwidth.2 \.. ;...# To match pre-Xft X11 appearance, use:..#.ttk::style configure . -font {Helvetica 12 bold}...ttk::style map "." -background \.. [list disabled $colors(-frame) active $colors(-activeb
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):12493
                                                                                      Entropy (8bit):5.024195855137721
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:l/9k9hqpFXQN9uK5Bt3NvnIW+KYNbrulkL90t98VrQETczIT9QeSaQjJI1/P0lcx:BhllSBtVL5MmI0K
                                                                                      MD5:FBCAA6A08D9830114248F91E10D4C918
                                                                                      SHA1:FA63C94824BEBD3531086816650D3F3FA73FE434
                                                                                      SHA-256:9D80AA9701E82862467684D3DFF1A9EC5BBC2BBBA4F4F070518BBDE7E38499BB
                                                                                      SHA-512:B377C31CC9137851679CBA0560EFE4265792D1576BD781DD42C22014A7A8F3D10D9D48A1154BB88A2987197594C8B728B71FA689CE1B32928F8513796A6A0AA3
                                                                                      Malicious:false
                                                                                      Preview:#.# Combobox bindings..#.# <<NOTE-WM-TRANSIENT>>:.#.#.Need to set [wm transient] just before mapping the popdown.#.instead of when it's created, in case a containing frame.#.has been reparented [#1818441]..#.#.On Windows: setting [wm transient] prevents the parent.#.toplevel from becoming inactive when the popdown is posted.#.(Tk 8.4.8+).#.#.On X11: WM_TRANSIENT_FOR on override-redirect windows.#.may be used by compositing managers and by EWMH-aware.#.window managers (even though the older ICCCM spec says.#.it's meaningless)..#.#.On OSX: [wm transient] does utterly the wrong thing..#.Instead, we use [MacWindowStyle "help" "noActivates hideOnSuspend"]..#.The "noActivates" attribute prevents the parent toplevel.#.from deactivating when the popdown is posted, and is also.#.necessary for "help" windows to receive mouse events..#."hideOnSuspend" makes the popdown disappear (resp. reappear).#.when the parent toplevel is deactivated (resp. reactivated)..#.(see [#1814778]). Also set [wm resiz
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4007
                                                                                      Entropy (8bit):4.827479665184231
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:xtIni2E1nmuVoLlTxG6qVXvDiPOaCkhxKLbqnJ2RLWumgMJVZlZPDjsfMh8vIviX:sn+myoLBxG3laOqJlZT3rkdSVOJm0
                                                                                      MD5:74596004DFDBF2ECF6AF9C851156415D
                                                                                      SHA1:933318C992B705BF9F8511621B4458ECB8772788
                                                                                      SHA-256:7BDFFA1C2692C5D1CF67B518F9ACB32FA4B4D9936ED076F4DB835943BC1A00D6
                                                                                      SHA-512:0D600B21DB67BF9DADBDD49559573078EFB41E473E94124AC4D2551BC10EC764846DC1F7674DAA79F8D2A8AEB4CA27A5E11C2F30EDE47E3ECEE77D60D7842262
                                                                                      Malicious:false
                                                                                      Preview:#.# Map symbolic cursor names to platform-appropriate cursors..#.# The following cursors are defined:.#.#.standard.-- default cursor for most controls.#.""..-- inherit cursor from parent window.#.none..-- no cursor.#.#.text..-- editable widgets (entry, text).#.link..-- hyperlinks within text.#.crosshair.-- graphic selection, fine control.#.busy..-- operation in progress.#.forbidden.-- action not allowed.#.#.hresize..-- horizontal resizing.#.vresize..-- vertical resizing.#.# Also resize cursors for each of the compass points,.# {nw,n,ne,w,e,sw,s,se}resize..#.# Platform notes:.#.# Windows doesn't distinguish resizing at the 8 compass points,.# only horizontal, vertical, and the two diagonals..#.# OSX doesn't have resize cursors for nw, ne, sw, or se corners..# We use the Tk-defined X11 fallbacks for these..#.# X11 doesn't have a "forbidden" cursor (usually a slashed circle);.# "pirate" seems to be the conventional cursor for this purpose..#.# Windows has an IDC_HELP cursor, but it's not
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4490
                                                                                      Entropy (8bit):4.888203318286333
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:AMUoi/higxS4JAigxS4J/1+tDtj/9uTaf30QOdt:AMUoQhigQ42igQ4kFMY3n0t
                                                                                      MD5:0E03292F7678540CB4F3440859863B0C
                                                                                      SHA1:909849894B02F2C213BDE0FBCED8C1378EB9B81E
                                                                                      SHA-256:304FF31FC82F6086C93AAA594D83D8DA25866CE1C2AF1208F9E7585D74CA9A51
                                                                                      SHA-512:87E5D2484E5E7E3C00B319219028B012576B7D73B84A9A13ED15551C9431BF216C0B96376AE5A7070B5A391D9887E55ABF9FA4AFEE971177408B7969363D9302
                                                                                      Malicious:false
                                                                                      Preview:#.# Settings for default theme..#..namespace eval ttk::theme::default {. variable colors. array set colors {..-frame..."#d9d9d9"..-foreground.."#000000"..-window..."#ffffff"..-text .."#000000"..-activebg.."#ececec"..-selectbg.."#4a6984"..-selectfg.."#ffffff"..-darker .."#c3c3c3"..-disabledfg.."#a3a3a3"..-indicator.."#4a6984"..-disabledindicator."#a3a3a3"..-altindicator.."#9fbdd8"..-disabledaltindicator."#c0c0c0". }.. ttk::style theme settings default {...ttk::style configure "." \.. -borderwidth .1 \.. -background .$colors(-frame) \.. -foreground .$colors(-foreground) \.. -troughcolor .$colors(-darker) \.. -font ..TkDefaultFont \.. -selectborderwidth.1 \.. -selectbackground.$colors(-selectbg) \.. -selectforeground.$colors(-selectfg) \.. -insertwidth .1 \.. -indicatordiameter.10 \.. ;...ttk::style map "." -background \.. [list disabled $colors(-frame) active $colors(-activebg)]..ttk::style map "." -foreground \.. [list disabled $colo
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):16408
                                                                                      Entropy (8bit):4.974125903666712
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:hRy3ALQksU0oayTUXIQzNiQ2iEL8QmOhQVqknFoTOXyJtcC1JMuZm4FZxO252ExD:GoUXmiEyOFWiTOEtcC1q252Ezp
                                                                                      MD5:F9B29AB14304F18E32821A29233BE816
                                                                                      SHA1:6D0253274D777E081FA36CC38E51C2ABB9259D0E
                                                                                      SHA-256:62D1DF52C510A83103BADAB4F3A77ABB1AA3A0E1E21F68ECE0CECCA2CA2F1341
                                                                                      SHA-512:698DB665E29B29864F9FE65934CCA83A5092D81D5130FFD1EAC68C51327AE9EBC007A60A60E1AF37063017E448CE84A4024D4A412990A1078287B605DF344C70
                                                                                      Malicious:false
                                                                                      Preview:#.# DERIVED FROM: tk/library/entry.tcl r1.22.#.# Copyright (c) 1992-1994 The Regents of the University of California..# Copyright (c) 1994-1997 Sun Microsystems, Inc..# Copyright (c) 2004, Joe English.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES..#..namespace eval ttk {. namespace eval entry {..variable State...set State(x) 0..set State(selectMode) none..set State(anchor) 0..set State(scanX) 0..set State(scanIndex) 0..set State(scanMoved) 0...# Button-2 scan speed is (scanNum/scanDen) characters..# per pixel of mouse movement...# The standard Tk entry widget uses the equivalent of..# scanNum = 10, scanDen = average character width...# I don't know why that was chosen...#..set State(scanNum) 1..set State(scanDen) 1..set State(deadband) 3.;# #pixels for mouse-moved deadband.. }.}..### Option database settings..#.option add *TEntry.cursor [ttk::cursor text] widgetDefault..### Bindings..#.# Removed
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5576
                                                                                      Entropy (8bit):4.956417003071239
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:Nduphbitcq1Zs/ZrBiZy227IhLkdhetOstWGbRafkeHH+4:3CheHvsbiZyDmJbRa3+4
                                                                                      MD5:7017B5C1D53F341F703322A40C76C925
                                                                                      SHA1:57540C56C92CC86F94B47830A00C29F826DEF28E
                                                                                      SHA-256:0EB518251FBE9CF0C9451CC1FEF6BB6AEE16D62DA00B0050C83566DA053F68D0
                                                                                      SHA-512:FD18976A8FBB7E59B12944C2628DBD66D463B2F7342661C8F67160DF37A393FA3C0CE7FDDA31073674B7A46E0A0A7D0A7B29EBE0D9488AFD9EF8B3A39410B5A8
                                                                                      Malicious:false
                                                                                      Preview:#.# Font specifications..#.# This file, [source]d at initialization time, sets up the following.# symbolic fonts based on the current platform:.#.# TkDefaultFont.-- default for GUI items not otherwise specified.# TkTextFont.-- font for user text (entry, listbox, others).# TkFixedFont.-- standard fixed width font.# TkHeadingFont.-- headings (column headings, etc).# TkCaptionFont -- dialog captions (primary text in alert dialogs, etc.).# TkTooltipFont.-- font to use for tooltip windows.# TkIconFont.-- font to use for icon captions.# TkMenuFont.-- used to use for menu items.#.# In Tk 8.5, some of these fonts may be provided by the TIP#145 implementation.# (On Windows and Mac OS X as of Oct 2007)..#.# +++ Platform notes:.#.# Windows:.#.The default system font changed from "MS Sans Serif" to "Tahoma".# .in Windows XP/Windows 2000..#.#.MS documentation says to use "Tahoma 8" in Windows 2000/XP,.#.although many MS programs still use "MS Sans Serif 8".#.#.Should use SystemParametersInfo() inst
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4913
                                                                                      Entropy (8bit):4.841521491900473
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:1reigApQy38gaQJy+3nN+PN8JdNhtOPqoK4J+wQCV7EkGxIaqc9ld9qtlWnITOZI:hfbJvnN+PN8JdNHs64J+wQCPGxtqWrqf
                                                                                      MD5:DB24841643CEBD38D5FFD1D42B42E7F4
                                                                                      SHA1:E394AF7FAF83FAD863C7B13D855FCF3705C4F1C7
                                                                                      SHA-256:81B0B7818843E293C55FF541BD95168DB51FE760941D32C7CDE9A521BB42E956
                                                                                      SHA-512:380272D003D5F90C13571952D0C73F5FCE2A22330F98F29707F3D5BFC29C99D9BF11A947CF2CA64CF7B8DF5E4AFE56FFA00F9455BB30D15611FC5C86130346BE
                                                                                      Malicious:false
                                                                                      Preview:#.# Bindings for Menubuttons..#.# Menubuttons have three interaction modes:.#.# Pulldown: Press menubutton, drag over menu, release to activate menu entry.# Popdown: Click menubutton to post menu.# Keyboard: <Key-space> or accelerator key to post menu.#.# (In addition, when menu system is active, "dropdown" -- menu posts.# on mouse-over. Ttk menubuttons don't implement this)..#.# For keyboard and popdown mode, we hand off to tk_popup and let .# the built-in Tk bindings handle the rest of the interaction..#.# ON X11:.#.# Standard Tk menubuttons use a global grab on the menubutton..# This won't work for Ttk menubuttons in pulldown mode,.# since we need to process the final <ButtonRelease> event,.# and this might be delivered to the menu. So instead we.# rely on the passive grab that occurs on <ButtonPress> events,.# and transition to popdown mode when the mouse is released.# or dragged outside the menubutton..# .# ON WINDOWS:.#.# I'm not sure what the hell is going on here. [$menu pos
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):5619
                                                                                      Entropy (8bit):4.937953914483602
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:d4tDJf49tzG809fhQAKWCgQOK/6PF+hEi8YYFSL+3FJVCj0QlK2kfJcQIni:d4tktzwfWngQOK/6PF+hDDYFNJVCj0Q2
                                                                                      MD5:82C9DFC512E143DDA78F91436937D4DD
                                                                                      SHA1:26ABC23C1E0C201A217E3CEA7A164171418973B0
                                                                                      SHA-256:D1E5267CDE3D7BE408B4C94220F7E1833C9D452BB9BA3E194E12A5EB2F9ADB80
                                                                                      SHA-512:A9D3C04AD67E0DC3F1C12F9E21EF28A61FA84DBF710313D4CA656BDF35DFBBFBA9C268C018004C1F5614DB3A1128025D795BC14B4FFFAA5603A5313199798D04
                                                                                      Malicious:false
                                                                                      Preview:#.# Bindings for TNotebook widget.#..namespace eval ttk::notebook {. variable TLNotebooks ;# See enableTraversal.}..bind TNotebook <ButtonPress-1>..{ ttk::notebook::Press %W %x %y }.bind TNotebook <Key-Right>..{ ttk::notebook::CycleTab %W 1; break }.bind TNotebook <Key-Left>..{ ttk::notebook::CycleTab %W -1; break }.bind TNotebook <Control-Key-Tab>.{ ttk::notebook::CycleTab %W 1; break }.bind TNotebook <Control-Shift-Key-Tab>.{ ttk::notebook::CycleTab %W -1; break }.catch {.bind TNotebook <Control-ISO_Left_Tab>.{ ttk::notebook::CycleTab %W -1; break }.}.bind TNotebook <Destroy>..{ ttk::notebook::Cleanup %W }..# ActivateTab $nb $tab --.#.Select the specified tab and set focus..#.# Desired behavior:.#.+ take focus when reselecting the currently-selected tab;.#.+ keep focus if the notebook already has it;.#.+ otherwise set focus to the first traversable widget.#. in the newly-selected tab;.#.+ do not leave the focus in a deselected tab..#.proc ttk::notebook::ActivateTab {w tab} {.
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1920
                                                                                      Entropy (8bit):4.916119835701688
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:kfkVpfktNZz51kfkB6fkO/cfkyk2fkI4fkI1fkxUufkYfkEtNMiyHvyPHfk9tNZ5:0ZPhMiyHvyPQZNtiisZvUriZPaa+fdl
                                                                                      MD5:A12915FA5CAF93E23518E9011200F5A4
                                                                                      SHA1:A61F665A408C10419FB81001578D99B43D048720
                                                                                      SHA-256:CE0053D637B580170938CF552B29AE890559B98EB28038C2F0A23A265DDEB273
                                                                                      SHA-512:669E1D66F1223CCA6CEB120914D5D876BD3CF401EE4A46F35825361076F19C7341695596A7DBB00D6CFF4624666FB4E7A2D8E7108C3C56A12BDA7B04E99E6F9A
                                                                                      Malicious:false
                                                                                      Preview:#.# Bindings for ttk::panedwindow widget..#..namespace eval ttk::panedwindow {. variable State. array set State {..pressed 0. .pressX.-..pressY.-..sash .-..sashPos -. }.}..## Bindings:.#.bind TPanedwindow <ButtonPress-1> .{ ttk::panedwindow::Press %W %x %y }.bind TPanedwindow <B1-Motion>..{ ttk::panedwindow::Drag %W %x %y }.bind TPanedwindow <ButtonRelease-1> .{ ttk::panedwindow::Release %W %x %y }..bind TPanedwindow <Motion> ..{ ttk::panedwindow::SetCursor %W %x %y }.bind TPanedwindow <Enter> ..{ ttk::panedwindow::SetCursor %W %x %y }.bind TPanedwindow <Leave> ..{ ttk::panedwindow::ResetCursor %W }.# See <<NOTE-PW-LEAVE-NOTIFYINFERIOR>>.bind TPanedwindow <<EnteredChild>>.{ ttk::panedwindow::ResetCursor %W }..## Sash movement:.#.proc ttk::panedwindow::Press {w x y} {. variable State.. set sash [$w identify $x $y]. if {$sash eq ""} {. .set State(pressed) 0..return. }. set State(pressed) .1. set State(pressX) .$x. set State(pressY) .$y. set State(sa
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):1089
                                                                                      Entropy (8bit):4.7101709883442755
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:o83oOUyNSiBj0oNA7h5EwIa2s0ImxamrNlUImyJDirNPpwWgJ:oMtS6j0eyEw0s02mhlU4khPp4J
                                                                                      MD5:B0074341A4BDA36BCDFF3EBCAE39EB73
                                                                                      SHA1:D070A01CC5A787249BC6DAD184B249C4DD37396A
                                                                                      SHA-256:A9C34F595E547CE94EE65E27C415195D2B210653A9FFCFB39559C5E0FA9C06F8
                                                                                      SHA-512:AF23563602886A648A42B03CC5485D84FCC094AB90B08DF5261434631B6C31CE38D83A3A60CC7820890C797F6C778D5B5EFF47671CE3EE4710AB14C6110DCC35
                                                                                      Malicious:false
                                                                                      Preview:#.# Ttk widget set: progress bar utilities..#..namespace eval ttk::progressbar {. variable Timers.;# Map: widget name -> after ID.}..# Autoincrement --.#.Periodic callback procedure for autoincrement mode.#.proc ttk::progressbar::Autoincrement {pb steptime stepsize} {. variable Timers.. if {![winfo exists $pb]} {. .# widget has been destroyed -- cancel timer..unset -nocomplain Timers($pb)..return. }.. set Timers($pb) [after $steptime \. .[list ttk::progressbar::Autoincrement $pb $steptime $stepsize] ].. $pb step $stepsize.}..# ttk::progressbar::start --.#.Start autoincrement mode. Invoked by [$pb start] widget code..#.proc ttk::progressbar::start {pb {steptime 50} {stepsize 1}} {. variable Timers. if {![info exists Timers($pb)]} {..Autoincrement $pb $steptime $stepsize. }.}..# ttk::progressbar::stop --.#.Cancel autoincrement mode. Invoked by [$pb stop] widget code..#.proc ttk::progressbar::stop {pb} {. variable Timers. if {[info exists Timers($pb
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2698
                                                                                      Entropy (8bit):4.7624002445430955
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:6Zsdayx/HZtYRqucO6wEKyRtZt0TcKVqZ4TFZkPDMiNf:Wde/5tYRquMwEKyFt0TcKVG4TrkLMwf
                                                                                      MD5:B41A9DF31924DEA36D69CB62891E8472
                                                                                      SHA1:4C2877FBB210FDBBDE52EA8B5617F68AD2DF7B93
                                                                                      SHA-256:25D0FE2B415292872EF7ACDB2DFA12D04C080B7F9B1C61F28C81AA2236180479
                                                                                      SHA-512:A50DB6DA3D40D07610629DE45F06A438C6F2846324C3891C54C99074CFB7BEED329F27918C8A85BADB22C6B64740A2053B891F8E5D129D9B0A1FF103E7137D83
                                                                                      Malicious:false
                                                                                      Preview:# scale.tcl - Copyright (C) 2004 Pat Thoyts <patthoyts@users.sourceforge.net>.#.# Bindings for the TScale widget..namespace eval ttk::scale {. variable State. array set State {..dragging 0. }.}..bind TScale <ButtonPress-1> { ttk::scale::Press %W %x %y }.bind TScale <B1-Motion> { ttk::scale::Drag %W %x %y }.bind TScale <ButtonRelease-1> { ttk::scale::Release %W %x %y }..bind TScale <ButtonPress-2> { ttk::scale::Jump %W %x %y }.bind TScale <B2-Motion> { ttk::scale::Drag %W %x %y }.bind TScale <ButtonRelease-2> { ttk::scale::Release %W %x %y }..bind TScale <ButtonPress-3> { ttk::scale::Jump %W %x %y }.bind TScale <B3-Motion> { ttk::scale::Drag %W %x %y }.bind TScale <ButtonRelease-3> { ttk::scale::Release %W %x %y }..## Keyboard navigation bindings:.#.bind TScale <<LineStart>> { %W set [%W cget -from] }.bind TScale <<LineEnd>> { %W set [%W cget -to] }..bind TScale <<PrevChar>> { ttk::scale::Increment %W -1 }.bind TScale <<PrevLine>> {
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):3097
                                                                                      Entropy (8bit):4.913511104649656
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:OsSofRsvfH3Noo2kvrjnWG3Lcyst0Rhrdy:plcHdoorDjWEFeuTy
                                                                                      MD5:93181DBE76EF9C39849A09242D6DF8C0
                                                                                      SHA1:DE3B47AFC3E5371BF1CD0541790A9B78A97570AB
                                                                                      SHA-256:5932043286A30A3CFFB2B6CE68CCDB9172A718F32926E25D3A962AE63CAD515C
                                                                                      SHA-512:5C85284E063A5DE17F6CE432B3EF899D046A78725BD1F930229576BED1116C03A3EE0611B988E9903F47DA8F694483E5A76464450C48EB14622F6784004B8F7E
                                                                                      Malicious:false
                                                                                      Preview:#.# Bindings for TScrollbar widget.#..# Still don't have a working ttk::scrollbar under OSX -.# Swap in a [tk::scrollbar] on that platform,.# unless user specifies -class or -style..#.if {[tk windowingsystem] eq "aqua"} {. rename ::ttk::scrollbar ::ttk::_scrollbar. proc ttk::scrollbar {w args} {..set constructor ::tk::scrollbar..foreach {option _} $args {.. if {$option eq "-class" || $option eq "-style"} {...set constructor ::ttk::_scrollbar...break.. }..}..return [$constructor $w {*}$args]. }.}..namespace eval ttk::scrollbar {. variable State. # State(xPress).--. # State(yPress).-- initial position of mouse at start of drag.. # State(first).-- value of -first at start of drag..}..bind TScrollbar <ButtonPress-1> .{ ttk::scrollbar::Press %W %x %y }.bind TScrollbar <B1-Motion>..{ ttk::scrollbar::Drag %W %x %y }.bind TScrollbar <ButtonRelease-1>.{ ttk::scrollbar::Release %W %x %y }..bind TScrollbar <ButtonPress-2> .{ ttk::scrollbar::Jump %W %x %y }.bind TScrollb
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2406
                                                                                      Entropy (8bit):4.78080326075935
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:KqL4LUBItZ3EZEhHR4vuRbMMie8GMW/H7vZZNQdqrYfy2nL+ZZvBb:KDYBIjHHRmiM1qvbnNQdqriyQIvB
                                                                                      MD5:3C8916A58C6EE1D61836E500A54C9321
                                                                                      SHA1:54F3F709698FAD020A048668749CB5A09EDE35AB
                                                                                      SHA-256:717D2EDD71076EA059903C7144588F8BBD8B0AFE69A55CBF23953149D6694D33
                                                                                      SHA-512:2B71569A5A96CAC1B708E894A2466B1054C3FAE5405E10799B182012141634BD2A7E9E9F516658E1A6D6E9E776E397608B581501A6CFE2EB4EC54459E9ECB267
                                                                                      Malicious:false
                                                                                      Preview:#.# Sizegrip widget bindings..#.# Dragging a sizegrip widget resizes the containing toplevel..#.# NOTE: the sizegrip widget must be in the lower right hand corner..#..switch -- [tk windowingsystem] {. x11 -. win32 {..option add *TSizegrip.cursor [ttk::cursor seresize] widgetDefault. }. aqua {. .# Aqua sizegrips use default Arrow cursor.. }.}..namespace eval ttk::sizegrip {. variable State. array set State {..pressed .0..pressX ..0..pressY ..0..width ..0..height ..0..widthInc.1..heightInc.1. resizeX 1. resizeY 1..toplevel .{}. }.}..bind TSizegrip <ButtonPress-1> ..{ ttk::sizegrip::Press.%W %X %Y }.bind TSizegrip <B1-Motion> ..{ ttk::sizegrip::Drag .%W %X %Y }.bind TSizegrip <ButtonRelease-1> .{ ttk::sizegrip::Release %W %X %Y }..proc ttk::sizegrip::Press {W X Y} {. variable State.. if {[$W instate disabled]} { return }.. set top [winfo toplevel $W].. # If the toplevel is not resizable then bail. foreach {State(resiz
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4255
                                                                                      Entropy (8bit):4.9576194953603006
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:17n+wMf6/ocy2nO6lz+Ni2QQ0Q3LqSFLfhrxJSS3hQb:ln+wMOxVlaNi2QQ0QbdFLfhrxJzhQb
                                                                                      MD5:86BCA3AB915C2774425B70420E499140
                                                                                      SHA1:FD4798D79EEBA9CFFABCB2548068591DB531A716
                                                                                      SHA-256:51F8A6C772648541684B48622FFE41B77871A185A8ACD11E9DEC9EC41D65D9CD
                                                                                      SHA-512:659FB7E1631ED898E3C11670A04B953EB05CECB42A3C5EFBDD1BD97A7F99061920FD5DB3915476F224BB2C72358623E1B474B0FC3FBB7FD3734487B87A388FD7
                                                                                      Malicious:false
                                                                                      Preview:#.# ttk::spinbox bindings.#..namespace eval ttk::spinbox { }..### Spinbox bindings..#.# Duplicate the Entry bindings, override if needed:.#..ttk::copyBindings TEntry TSpinbox..bind TSpinbox <Motion>...{ ttk::spinbox::Motion %W %x %y }.bind TSpinbox <ButtonPress-1> ..{ ttk::spinbox::Press %W %x %y }.bind TSpinbox <ButtonRelease-1> .{ ttk::spinbox::Release %W }.bind TSpinbox <Double-Button-1> .{ ttk::spinbox::DoubleClick %W %x %y }.bind TSpinbox <Triple-Button-1> .{} ;# disable TEntry triple-click..bind TSpinbox <KeyPress-Up>..{ event generate %W <<Increment>> }.bind TSpinbox <KeyPress-Down> ..{ event generate %W <<Decrement>> }..bind TSpinbox <<Increment>>..{ ttk::spinbox::Spin %W +1 }.bind TSpinbox <<Decrement>> ..{ ttk::spinbox::Spin %W -1 }..ttk::bindMouseWheel TSpinbox ..[list ttk::spinbox::MouseWheel %W]..## Motion --.#.Sets cursor..#.proc ttk::spinbox::Motion {w x y} {. if { [$w identify $x $y] eq "textarea". && [$w instate {!readonly !disabled}]. } {..ttk::setCurso
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8898
                                                                                      Entropy (8bit):4.860766938410698
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:2Ou002WQZ4sNNxjKomA3xj9L/37NbbF3r3G4eeMxCSbk3TPMrngEibSB1GjwPBKf:ZWeZ5BDFK+DsXibSQUMHLCGLdE2bZ
                                                                                      MD5:46B1D0EADBCF11AC51DD14B1A215AE04
                                                                                      SHA1:339026AE9533F4C331ADF8C71799B222DDD89D4F
                                                                                      SHA-256:DB6FAA8540C322F3E314968256D8AFFF39A1E4700EC17C7EFE364241F355D80F
                                                                                      SHA-512:0FC81426857949D5AC9FE7FF3C85A1270BD35BF6E6EAF3FE7AE0DE22A0C0E5CD96D6C9471216DC1DA673FAD949CA96A3751C3D3222474D2206AA9D8A455BA12E
                                                                                      Malicious:false
                                                                                      Preview:#.# ttk::treeview widget bindings and utilities..#..namespace eval ttk::treeview {. variable State.. # Enter/Leave/Motion. #. set State(activeWidget) .{}. set State(activeHeading) .{}.. # Press/drag/release:. #. set State(pressMode) .none. set State(pressX)..0.. # For pressMode == "resize". set State(resizeColumn).#0.. # For pressmode == "heading". set State(heading) .{}.}..### Widget bindings..#..bind Treeview.<Motion> ..{ ttk::treeview::Motion %W %x %y }.bind Treeview.<B1-Leave>..{ #nothing }.bind Treeview.<Leave>...{ ttk::treeview::ActivateHeading {} {}}.bind Treeview.<ButtonPress-1> .{ ttk::treeview::Press %W %x %y }.bind Treeview.<Double-ButtonPress-1> .{ ttk::treeview::DoubleClick %W %x %y }.bind Treeview.<ButtonRelease-1> .{ ttk::treeview::Release %W %x %y }.bind Treeview.<B1-Motion> ..{ ttk::treeview::Drag %W %x %y }.bind Treeview .<KeyPress-Up> .{ ttk::treeview::Keynav %W up }.bind Treeview .<KeyPress-Down> .{ ttk::treeview::Keynav %
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):4546
                                                                                      Entropy (8bit):4.888987944406022
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:53a25129CKELfMonw+PzpaVnNqovaq2126262R2D2q2k2j+/2FhbtpGt0vcWOQRg:53j5MoKE7JEnN7CTMDDA6Tlj+uFhbttK
                                                                                      MD5:E38B399865C45E49419C01FF2ADDCE75
                                                                                      SHA1:F8A79CBC97A32622922D4A3A5694BCCB3F19DECB
                                                                                      SHA-256:61BAA0268770F127394A006340D99CE831A1C7AD773181C0C13122F7D2C5B7F6
                                                                                      SHA-512:285F520B648F5EC70DD79190C3B456F4D6DA2053210985F9E2C84139D8D51908296E4962B336894EE30536F09FAE84B912BC2ABF44A7011620F66CC5D9F71A8C
                                                                                      Malicious:false
                                                                                      Preview:#.# Ttk widget set initialization script..#..### Source library scripts..#..namespace eval ::ttk {. variable library. if {![info exists library]} {..set library [file dirname [info script]]. }.}..source [file join $::ttk::library fonts.tcl].source [file join $::ttk::library cursors.tcl].source [file join $::ttk::library utils.tcl]..## ttk::deprecated $old $new --.#.Define $old command as a deprecated alias for $new command.#.$old and $new must be fully namespace-qualified..#.proc ttk::deprecated {old new} {. interp alias {} $old {} ttk::do'deprecate $old $new.}.## do'deprecate --.#.Implementation procedure for deprecated commands --.#.issue a warning (once), then re-alias old to new..#.proc ttk::do'deprecate {old new args} {. deprecated'warning $old $new. interp alias {} $old {} $new. uplevel 1 [linsert $args 0 $new].}..## deprecated'warning --.#.Gripe about use of deprecated commands..#.proc ttk::deprecated'warning {old new} {. puts stderr "$old deprecated -- u
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):8562
                                                                                      Entropy (8bit):4.958950985117383
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:MpEpXI4jqmW/y3gp9F+QE9PBRc+vWHJOfqW8j3ki3LDRdielRu+MXw+:6yXuwg1oPnc+epOEj31/s/5
                                                                                      MD5:65193FE52D77B8726B75FBF909EE860A
                                                                                      SHA1:991DEDD4666462DD9776FDF6C21F24D6CF794C85
                                                                                      SHA-256:C7CC9A15CFA999CF3763772729CC59F629E7E060AF67B7D783C50530B9B756E1
                                                                                      SHA-512:E43989F5F368D2E19C9A3521FB82C6C1DD9EEB91DF936A980FFC7674C8B236CB84E113908B8C9899B85430E8FC30315BDEC891071822D701C91C5978096341B7
                                                                                      Malicious:false
                                                                                      Preview:#.# Utilities for widget implementations..#..### Focus management..#.# See also: #1516479.#..## ttk::takefocus --.#.This is the default value of the "-takefocus" option.#.for ttk::* widgets that participate in keyboard navigation..#.# NOTES:.#.tk::FocusOK (called by tk_focusNext) tests [winfo viewable].#.if -takefocus is 1, empty, or missing; but not if it's a.#.script prefix, so we have to check that here as well..#.#.proc ttk::takefocus {w} {. expr {[$w instate !disabled] && [winfo viewable $w]}.}..## ttk::GuessTakeFocus --.#.This routine is called as a fallback for widgets.#.with a missing or empty -takefocus option..#.#.It implements the same heuristics as tk::FocusOK..#.proc ttk::GuessTakeFocus {w} {. # Don't traverse to widgets with '-state disabled':. #. if {![catch {$w cget -state} state] && $state eq "disabled"} {..return 0. }.. # Allow traversal to widgets with explicit key or focus bindings:. #. if {[regexp {Key|Focus} [concat [bind $w] [bind [winfo c
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):9670
                                                                                      Entropy (8bit):4.6132627565634055
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:kSsdZ6XzgE2kiSCyNPNVVSCIA5l/r5l/rW+i/CE38S7r/2JeJnpna+yfdyMq53Id:QZ6XzD2kFVeArPKJ3z7cQ0383cdd
                                                                                      MD5:ED071B9CEA98B7594A7E74593211BD38
                                                                                      SHA1:90998A1A51BCBAA3B4D72B08F5CBF19E330148D2
                                                                                      SHA-256:98180630FC1E8D7D7C1B20A5FF3352C8BD8CF259DD4EB3B829B8BD4CB8AE76A4
                                                                                      SHA-512:60C1EA45481AF5CFA3C5E579514DD3F4AC6C8D168553F374D0A3B3E1342E76CB71FA825C306233E185BED057E2B99877BAF9A5E88EBD48CF6DE171A8E7F6A230
                                                                                      Malicious:false
                                                                                      Preview:#.# Settings for Microsoft Windows Vista and Server 2008.#..# The Vista theme can only be defined on Windows Vista and above. The theme.# is created in C due to the need to assign a theme-enabled function for .# detecting when themeing is disabled. On systems that cannot support the.# Vista theme, there will be no such theme created and we must not.# evaluate this script...if {"vista" ni [ttk::style theme names]} {. return.}..namespace eval ttk::theme::vista {.. ttk::style theme settings vista {.. .ttk::style configure . \.. -background SystemButtonFace \.. -foreground SystemWindowText \.. -selectforeground SystemHighlightText \.. -selectbackground SystemHighlight \.. -insertcolor SystemWindowText \.. -font TkDefaultFont \.. ;...ttk::style map "." \.. -foreground [list disabled SystemGrayText] \.. ;...ttk::style configure TButton -anchor center -padding {1 1} -width -11..ttk::style configure TRadiobutton -padding 2..ttk::style configure TCheckbutton -pa
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2867
                                                                                      Entropy (8bit):4.876730704118724
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:679ahSh6FPGh0Ds0IXF6yjAfSAfqFRaBgLtei42kt+5Ql/n+iOaVhttZLgtKZLtO:6UJM0uTk5tm4RX0
                                                                                      MD5:0AE8205DFBA3C9B8EEAD01AC11C965D6
                                                                                      SHA1:61E8D2E909CF46886F6EA8571D4234DD336FEFB3
                                                                                      SHA-256:93E4011CAA9F01802D6DD5E02C3104E619084799E949974DFEE5E0C94D1E3952
                                                                                      SHA-512:E4448B922CA0FB425F879988537B9DB8F8C8A5A773805607574499506FDD9DEEB9CD41660E497002F78727AFBE3BEC17D9674E99CEF4A9D66FFD9C4536AFE153
                                                                                      Malicious:false
                                                                                      Preview:#.# Settings for 'winnative' theme..#..namespace eval ttk::theme::winnative {. ttk::style theme settings winnative {...ttk::style configure "." \.. -background SystemButtonFace \.. -foreground SystemWindowText \.. -selectforeground SystemHighlightText \.. -selectbackground SystemHighlight \.. -fieldbackground SystemWindow \.. -insertcolor SystemWindowText \.. -troughcolor SystemScrollbar \.. -font TkDefaultFont \.. ;...ttk::style map "." -foreground [list disabled SystemGrayText] ;. ttk::style map "." -embossed [list disabled 1] ;...ttk::style configure TButton \.. -anchor center -width -11 -relief raised -shiftrelief 1..ttk::style configure TCheckbutton -padding "2 4"..ttk::style configure TRadiobutton -padding "2 4"..ttk::style configure TMenubutton \.. -padding "8 4" -arrowsize 3 -relief raised...ttk::style map TButton -relief {{!disabled pressed} sunken}...ttk::style configure TEntry \.. -padding 2 -selectborderwidth 0 -insertwidth 1..t
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):2375
                                                                                      Entropy (8bit):4.931678702435916
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:NaxYun9ahShCd/T5QNt+7aVzEmAf8Afb9AfMMB+iOaVhttZLgtKZLti:k41eTXM
                                                                                      MD5:BD892A940333C1B804DF5C4594B0A5E6
                                                                                      SHA1:4E187F09F45898749CFE7860EDEF0D5EB83D764E
                                                                                      SHA-256:196C6FEF40FB6296D7762F30058AA73273083906F72F490E69FC77F1D5589B88
                                                                                      SHA-512:8273A8F789D695601A7BC74DFA2A6BD7FE280EC528869F502A578E90B6DD1613C4BCC5B6CD0D93A5CA0E6538BE740CD370F634DA84064213E1F50B919EBF35B8
                                                                                      Malicious:false
                                                                                      Preview:#.# Settings for 'xpnative' theme.#..namespace eval ttk::theme::xpnative {.. ttk::style theme settings xpnative {...ttk::style configure . \.. -background SystemButtonFace \.. -foreground SystemWindowText \.. -selectforeground SystemHighlightText \.. -selectbackground SystemHighlight \.. -insertcolor SystemWindowText \.. -font TkDefaultFont \.. ;...ttk::style map "." \.. -foreground [list disabled SystemGrayText] \.. ;...ttk::style configure TButton -anchor center -padding {1 1} -width -11..ttk::style configure TRadiobutton -padding 2..ttk::style configure TCheckbutton -padding 2..ttk::style configure TMenubutton -padding {8 4}...ttk::style configure TNotebook -tabmargins {2 2 2 0}..ttk::style map TNotebook.Tab \.. -expand [list selected {2 2 2 2}]...# Treeview:..ttk::style configure Heading -font TkHeadingFont..ttk::style configure Treeview -background SystemWindow..ttk::style map Treeview \.. -background [list selected SystemHighlight] \.. -fore
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:dropped
                                                                                      Size (bytes):10252
                                                                                      Entropy (8bit):5.02143730499245
                                                                                      Encrypted:false
                                                                                      SSDEEP:192:1kMv11IDCB7PFPHGosvS6UMn8O9MGM/OTMjcrrwrt:xuMYMj+sZ
                                                                                      MD5:C832FDF24CA1F5C5E9B33FA5ECD11CAC
                                                                                      SHA1:8082FDE50C428D2511B05F529FCCF02651D5AC93
                                                                                      SHA-256:E34D828E740F151B96022934AAEC7BB8343E23D040FB54C04641888F51767EB8
                                                                                      SHA-512:58BEB05778271D4C91527B1CB23491962789D95ACCBC6C28E25D05BD3D6172AAC9A90E7741CD606C69FB8CECC29EE515DA7C7D4E6098BF67F08F18DFB7983323
                                                                                      Malicious:false
                                                                                      Preview:# unsupported.tcl --.#.# Commands provided by Tk without official support. Use them at your.# own risk. They may change or go away without notice..#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...# ----------------------------------------------------------------------.# Unsupported compatibility interface for folks accessing Tk's private.# commands and variable against recommended usage..# ----------------------------------------------------------------------..namespace eval ::tk::unsupported {.. # Map from the old global names of Tk private commands to their. # new namespace-encapsulated names... variable PrivateCommands. array set PrivateCommands {..tkButtonAutoInvoke..::tk::ButtonAutoInvoke..tkButtonDown...::tk::ButtonDown..tkButtonEnter...::tk::ButtonEnter..tkButtonInvoke...::tk::ButtonInvoke..tkButtonLeave...::tk::ButtonLeave..tkButtonUp...::tk::ButtonUp..tkCancelRepeat...::tk::Cance
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:ASCII text
                                                                                      Category:modified
                                                                                      Size (bytes):26075
                                                                                      Entropy (8bit):4.9212533677507535
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:obPA7Xi6V2+Bec3ipnFH6HZ1KDZvRcbQ3sd1GkjDo413lK/RIV5MXrSomsjiETwM:orA3TVJc3sd1GkF3cIVf591w
                                                                                      MD5:F863B7C5680017EE9F744900CC6C3834
                                                                                      SHA1:155E6E8752F6D48EF8D32CE2228E17EE58C2768E
                                                                                      SHA-256:9C78A976BBC933863FB0E4C23EE62B26F8EB3D7F101D7D32E6768579499E43B1
                                                                                      SHA-512:34F5B51EA1A2EFCD53B51A74E7E9B69FB154E017527BBD1CB3961F1619E74BE9D49D0583D193DBA7E8A3904F6C7446F278BC7977011DCCDAEBBE42D71FA5630C
                                                                                      Malicious:false
                                                                                      Preview:# xmfbox.tcl --.#.#.Implements the "Motif" style file selection dialog for the.#.Unix platform. This implementation is used only if the.#."::tk_strictMotif" flag is set..#.# Copyright (c) 1996 Sun Microsystems, Inc..# Copyright (c) 1998-2000 Scriptics Corporation.#.# See the file "license.terms" for information on usage and redistribution.# of this file, and for a DISCLAIMER OF ALL WARRANTIES...namespace eval ::tk::dialog {}.namespace eval ::tk::dialog::file {}...# ::tk::MotifFDialog --.#.#.Implements a file dialog similar to the standard Motif file.#.selection box..#.# Arguments:.#.type.."open" or "save".#.args..Options parsed by the procedure..#.# Results:.#.When -multiple is set to 0, this returns the absolute pathname.#.of the selected file. (NOTE: This is not the same as a single.#.element list.).#.#.When -multiple is set to > 0, this returns a Tcl list of absolute.# pathnames. The argument for -multiple is ignored, but for consistency.# with Windows it defines the max
                                                                                      Process:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):1073680
                                                                                      Entropy (8bit):5.327852618149687
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:ge+YbeoEYa6l0SYxytHcQJJwEI+V/IFx7agsSJNzkRoEVnOPmrZ6bK:ge+BN6axoc1r+VUx7agnNctOo6K
                                                                                      MD5:4D3D8E16E98558FF9DAC8FC7061E2759
                                                                                      SHA1:C918AB67B580F955B6361F9900930DA38CEC7C91
                                                                                      SHA-256:016D962782BEAE0EA8417A17E67956B27610F4565CFF71DD35A6E52AB187C095
                                                                                      SHA-512:0DFABFAD969DA806BC9C6C664CDF31647D89951832FF7E4E5EEED81F1DE9263ED71BDDEFF76EBB8E47D6248AD4F832CB8AD456F11E401C3481674BD60283991A
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........VQx..Qx..Qx..X.O.Wx..j&..Sx..j&..Sx..j&..Zx..j&..[x...&..Rx......Sx..Qx...x...&..Px...&..Px...&#.Px...&..Px..RichQx..........................PE..d...w.:_.........." .....@..........h5....................................................`..........................................b..X...Hc.......p.......P..X....H..............`u..T............................u...............P..8............................text...Q?.......@.................. ..`.rdata.......P.......D..............@..@.data........p.......`..............@....pdata..X....P......................@..@.gfids.......`.......8..............@..@.rsrc........p.......:..............@..@.reloc...............F..............@..B........................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\153C.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:modified
                                                                                      Size (bytes):704000
                                                                                      Entropy (8bit):6.498036046725285
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:kRObekMSkfohrPUs37uzHnA6zg5cI5MpAHERDjrNyTeR0oUGOHtraxDExyc:WObekrkfohrP337uzHnA6cH+iHEOWUGq
                                                                                      MD5:DC768C91E97B42F218028EFA028C41CC
                                                                                      SHA1:63E5B917E7EB1FE94707CDE664875B71B247EEB5
                                                                                      SHA-256:A0991507C9DA2C3E21DDA334920FC6C36A7FA1595D4C865C6C200C05128F2EFE
                                                                                      SHA-512:956D9B9B092B030D99ED6FF9673A0C132FF0565BD80C7AC63BFAC1E3D80062BC641585776BA0D86E2F39DF0D2CDD6DED403979E9CAA65BBB42EC01A0D4106459
                                                                                      Malicious:false
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................d...........p............@..............................................@...............................%..................................................................................................................CODE....(c.......d.................. ..`DATA.................h..............@...BSS..................z...................idata...%.......&...z..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc...............................@..P.....................H..............@..P........................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):4096
                                                                                      Entropy (8bit):4.026670007889822
                                                                                      Encrypted:false
                                                                                      SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                                                      MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                                                      SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                                                      SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                                                      SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):2560
                                                                                      Entropy (8bit):2.8818118453929262
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                      MD5:A69559718AB506675E907FE49DEB71E9
                                                                                      SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                      SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                      SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):13312
                                                                                      Entropy (8bit):5.745960477552938
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
                                                                                      MD5:A813D18268AFFD4763DDE940246DC7E5
                                                                                      SHA1:C7366E1FD925C17CC6068001BD38EAEF5B42852F
                                                                                      SHA-256:E19781AABE466DD8779CB9C8FA41BBB73375447066BB34E876CF388A6ED63C64
                                                                                      SHA-512:B310ED4CD2E94381C00A6A370FCB7CC867EBE425D705B69CAAAAFFDAFBAB91F72D357966916053E72E68ECF712F2AF7585500C58BB53EC3E1D539179FCB45FB4
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........I...(...(...(..n ..(...(...(...$..(...$..(...$..(..Rich.(..................PE..L......B...........!..... ..........p........0....P..........................P.......................................;.......;..(............................@.......0...............................................0...............................text............ .................. ..`.rdata.......0.......$..............@..@.reloc.......@.......2..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):6144
                                                                                      Entropy (8bit):4.215994423157539
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                                      MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                                      SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                                      SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                                      SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):23312
                                                                                      Entropy (8bit):4.596242908851566
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                      MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                      SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                      SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                      SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                      Malicious:false
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Users\user\AppData\Local\Temp\153C.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:modified
                                                                                      Size (bytes):704000
                                                                                      Entropy (8bit):6.498036046725285
                                                                                      Encrypted:false
                                                                                      SSDEEP:12288:kRObekMSkfohrPUs37uzHnA6zg5cI5MpAHERDjrNyTeR0oUGOHtraxDExyc:WObekrkfohrP337uzHnA6cH+iHEOWUGq
                                                                                      MD5:DC768C91E97B42F218028EFA028C41CC
                                                                                      SHA1:63E5B917E7EB1FE94707CDE664875B71B247EEB5
                                                                                      SHA-256:A0991507C9DA2C3E21DDA334920FC6C36A7FA1595D4C865C6C200C05128F2EFE
                                                                                      SHA-512:956D9B9B092B030D99ED6FF9673A0C132FF0565BD80C7AC63BFAC1E3D80062BC641585776BA0D86E2F39DF0D2CDD6DED403979E9CAA65BBB42EC01A0D4106459
                                                                                      Malicious:false
                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................d...........p............@..............................................@...............................%..................................................................................................................CODE....(c.......d.................. ..`DATA.................h..............@...BSS..................z...................idata...%.......&...z..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc...............................@..P.....................H..............@..P........................................................................................................................................
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:dropped
                                                                                      Size (bytes):247808
                                                                                      Entropy (8bit):6.567029107520214
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:udoz4L1fDdZL04QqkwmSvddBz8R1a1Jrb8QpjHWOrcIiR1ol+dNYVDBk:Xz4L9DwwBvvBZJ6dolkNs
                                                                                      MD5:9527ADB6094EAB92B0A8C22E2BFFE713
                                                                                      SHA1:93CA6D0FEA8A6583F947515B47360E31894326B5
                                                                                      SHA-256:08BF93D859767B6623B49312CDC8076B701D2147CE3D87E3A994734F0F1319A3
                                                                                      SHA-512:3E2D637974E065F8EFEB46E5019A4896476AE13C35ABC109ABE691387C734F4AEF8A4F9B20890484B292C1AEE70C8451952D13B95828E81253C4F50F0824AF67
                                                                                      Malicious:true
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................PE..L....d......................C......<.......0....@...........................E.............................................[..P.....D..g...........................1...............................N..@............0..|............................text............................... ..`.rdata...3...0...4..................@..@.data...|.B..p.......L..............@....rsrc....g....D..h...`..............@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):26
                                                                                      Entropy (8bit):3.95006375643621
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:ggPYV:rPYV
                                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                      Malicious:true
                                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):248887
                                                                                      Entropy (8bit):7.9992911109238864
                                                                                      Encrypted:true
                                                                                      SSDEEP:6144:jvGL3dswWpPhhmxhy+0iNte5nsp/bXMRlFSGS66Kf:jvmG5Y3vfOsNXMR/SYff
                                                                                      MD5:27103FFFEFC4722B1DE81122E724A7CD
                                                                                      SHA1:176350B160F2E3C94793576F5A44D55517813554
                                                                                      SHA-256:F35F1D473CBAFE8A1E2D28E2E07A2FC164A82D968724035C74549383DDE4CE61
                                                                                      SHA-512:D965D95C703F7E70DBA37BD89080226B9D38F22209D46FF2F7422D851781A5AA70C4E1BD52E77C544847F8AD0B2F784D68F12A905AAAAC10C32F092DF651EC97
                                                                                      Malicious:false
                                                                                      Preview:...."..Q.e...An{.0..)m...3.A.N.8.r.2W.N..<...w...@J..n..C.kT.!..4p".o,I.qd...U4..uY..x\.o.....d:.o.$....Bnf..3.YrC....L.n!.sSm....+..1..c.......U.9(..>......._..g+UCL6.;"Hbs...v5.S<.).j*.......>.E.Q......K..%.x..../.o........8.......'..@.u)..`-..tw.t....E....&...j.........+oq.......;.G.NV.[Q..o.EK.....1..@.&~..dh..F.MJ!n.g...........F....(...hD R..uW....\.....-.....g...tccw.#Z.._.........==fy'...........d..~.....-.......r..o..*....Q.t(1.".1.D@.A.A0..L2...-..6}.P...U..-.&.........H........k?...F...+-7.<x.S..:......aH......."......(..o.......n.Ea].f.5...qo.yv.x..,.@.3".p.`...6...X..`....+70l.v[.5...yUE.....a$...cx=...)..>qt..r.i...(...........9.5...h....e....?.N.q..,<o.k........K.2a...U.....v'x...T...1...o...&...>p.^.0A.q.EJ...J.,V.vuW..jSU.C.(#.),....A:.#._K...^..Y....7Vn.....xP........'X....L..A.B.U0.^\....[r.;.....y........+.(jh....D10..`.eU.|...jQ4?k.e|.j.J....E....2"..`.:94g1h.......7\..................N...g....{...D.T.x).E?U..h..
                                                                                      Process:C:\Windows\explorer.exe
                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Category:modified
                                                                                      Size (bytes):247808
                                                                                      Entropy (8bit):6.569379368574319
                                                                                      Encrypted:false
                                                                                      SSDEEP:3072:u9oz5L1fzdy7aCtjUGjZNaz9MNoisgcc25DAgweORrR1/XhdNYVDBk:nz5LN21tjjjZNAMN9sgBg3TO9/nNs
                                                                                      MD5:727A16734E04C21EE28B8981510BF802
                                                                                      SHA1:B13A3F83CDB7719A41C0ACC642893E024CFC4CEF
                                                                                      SHA-256:738AA03458DF3924541D13BF664F1863573963E17FC65CAF37671556069CC5C2
                                                                                      SHA-512:51430D1B0F5A61BE307771A5372B47624B9F9D3FBADED80FC1E017E4668C0F31E2D862B02DC08268634FE0464583C4BC189985BCDC9933B1FB5B2A550F255D70
                                                                                      Malicious:true
                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................PE..L....Nod......................C......<.......0....@...........................E.....?l.......................................[..P.....D..g...........................1...............................N..@............0..|............................text...b........................... ..`.rdata...3...0...4..................@..@.data...|.B..p.......L..............@....rsrc....g....D..h...`..............@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):6.567029107520214
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) a (10002005/4) 99.94%
                                                                                      • Clipper DOS Executable (2020/12) 0.02%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                      • VXD Driver (31/22) 0.00%
                                                                                      File name:27i42a6Qag.exe
                                                                                      File size:247'808 bytes
                                                                                      MD5:9527adb6094eab92b0a8c22e2bffe713
                                                                                      SHA1:93ca6d0fea8a6583f947515b47360e31894326b5
                                                                                      SHA256:08bf93d859767b6623b49312cdc8076b701d2147ce3d87e3a994734f0f1319a3
                                                                                      SHA512:3e2d637974e065f8efeb46e5019a4896476ae13c35abc109abe691387c734f4aef8a4f9b20890484b292c1aee70c8451952d13b95828e81253c4f50f0824af67
                                                                                      SSDEEP:3072:udoz4L1fDdZL04QqkwmSvddBz8R1a1Jrb8QpjHWOrcIiR1ol+dNYVDBk:Xz4L9DwwBvvBZJ6dolkNs
                                                                                      TLSH:C634295352E0BD50EA364B739E6EC6E8B61DF690DF4937AA12185A9F0CB01F2C173712
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................PE..L......d...........
                                                                                      Icon Hash:63396de971636e0f
                                                                                      Entrypoint:0x403caa
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x6496A8E6 [Sat Jun 24 08:27:18 2023 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:5
                                                                                      OS Version Minor:0
                                                                                      File Version Major:5
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:5
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:21a899cb2bf7f1bc566f7c47e1443114
                                                                                      Instruction
                                                                                      call 00007F956C7CDA42h
                                                                                      jmp 00007F956C7CA8FEh
                                                                                      mov edi, edi
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      push ecx
                                                                                      push ebx
                                                                                      push esi
                                                                                      push edi
                                                                                      push dword ptr [00847368h]
                                                                                      call 00007F956C7CD2E8h
                                                                                      push dword ptr [00847364h]
                                                                                      mov edi, eax
                                                                                      mov dword ptr [ebp-04h], edi
                                                                                      call 00007F956C7CD2D8h
                                                                                      mov esi, eax
                                                                                      pop ecx
                                                                                      pop ecx
                                                                                      cmp esi, edi
                                                                                      jc 00007F956C7CAB09h
                                                                                      mov ebx, esi
                                                                                      sub ebx, edi
                                                                                      lea eax, dword ptr [ebx+04h]
                                                                                      cmp eax, 04h
                                                                                      jc 00007F956C7CAAF9h
                                                                                      push edi
                                                                                      call 00007F956C7CDB70h
                                                                                      mov edi, eax
                                                                                      lea eax, dword ptr [ebx+04h]
                                                                                      pop ecx
                                                                                      cmp edi, eax
                                                                                      jnc 00007F956C7CAACAh
                                                                                      mov eax, 00000800h
                                                                                      cmp edi, eax
                                                                                      jnc 00007F956C7CAA84h
                                                                                      mov eax, edi
                                                                                      add eax, edi
                                                                                      cmp eax, edi
                                                                                      jc 00007F956C7CAA91h
                                                                                      push eax
                                                                                      push dword ptr [ebp-04h]
                                                                                      call 00007F956C7CDAFEh
                                                                                      pop ecx
                                                                                      pop ecx
                                                                                      test eax, eax
                                                                                      jne 00007F956C7CAA98h
                                                                                      lea eax, dword ptr [edi+10h]
                                                                                      cmp eax, edi
                                                                                      jc 00007F956C7CAAC2h
                                                                                      push eax
                                                                                      push dword ptr [ebp-04h]
                                                                                      call 00007F956C7CDAE8h
                                                                                      pop ecx
                                                                                      pop ecx
                                                                                      test eax, eax
                                                                                      je 00007F956C7CAAB3h
                                                                                      sar ebx, 02h
                                                                                      push eax
                                                                                      lea esi, dword ptr [eax+ebx*4]
                                                                                      call 00007F956C7CD1F3h
                                                                                      pop ecx
                                                                                      mov dword ptr [00847368h], eax
                                                                                      push dword ptr [ebp+08h]
                                                                                      call 00007F956C7CD1E5h
                                                                                      mov dword ptr [esi], eax
                                                                                      add esi, 04h
                                                                                      push esi
                                                                                      call 00007F956C7CD1DAh
                                                                                      pop ecx
                                                                                      mov dword ptr [00847364h], eax
                                                                                      mov eax, dword ptr [ebp+08h]
                                                                                      pop ecx
                                                                                      jmp 00007F956C7CAA84h
                                                                                      xor eax, eax
                                                                                      pop edi
                                                                                      pop esi
                                                                                      pop ebx
                                                                                      leave
                                                                                      ret
                                                                                      mov edi, edi
                                                                                      push esi
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x25b080x50.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4480000x167d0.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x231d00x1c.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x24ea00x40.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x230000x17c.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000x213120x21400False0.7942316729323309data7.402660917481356IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .rdata0x230000x33ae0x3400False0.3683894230769231data5.223199654796926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .data0x270000x42037c0x1400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .rsrc0x4480000x167d00x16800False0.38800998263888886data4.559233468775612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      JUDOMUKOKIYAXEJUNEZALI0x458cf80x1e31ASCII text, with very long lines (7729), with no line terminatorsPunjabiPakistan0.58739811101048
                                                                                      JUDOMUKOKIYAXEJUNEZALI0x458cf80x1e31ASCII text, with very long lines (7729), with no line terminatorsPunjabiIndia0.58739811101048
                                                                                      YOLEMOMADITO0x4583100x9e7ASCII text, with very long lines (2535), with no line terminatorsPunjabiPakistan0.6082840236686391
                                                                                      YOLEMOMADITO0x4583100x9e7ASCII text, with very long lines (2535), with no line terminatorsPunjabiIndia0.6082840236686391
                                                                                      RT_CURSOR0x45abc00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                                                                      RT_CURSOR0x45ba680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                                                                      RT_CURSOR0x45c3100x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                                                                      RT_ICON0x4488700x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0PunjabiPakistan0.5316820276497696
                                                                                      RT_ICON0x4488700x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0PunjabiIndia0.5316820276497696
                                                                                      RT_ICON0x448f380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0PunjabiPakistan0.41286307053941906
                                                                                      RT_ICON0x448f380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0PunjabiIndia0.41286307053941906
                                                                                      RT_ICON0x44b4e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0PunjabiPakistan0.449468085106383
                                                                                      RT_ICON0x44b4e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0PunjabiIndia0.449468085106383
                                                                                      RT_ICON0x44b9780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0PunjabiPakistan0.4904051172707889
                                                                                      RT_ICON0x44b9780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0PunjabiIndia0.4904051172707889
                                                                                      RT_ICON0x44c8200x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0PunjabiPakistan0.4675090252707581
                                                                                      RT_ICON0x44c8200x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0PunjabiIndia0.4675090252707581
                                                                                      RT_ICON0x44d0c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0PunjabiPakistan0.4328034682080925
                                                                                      RT_ICON0x44d0c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0PunjabiIndia0.4328034682080925
                                                                                      RT_ICON0x44d6300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0PunjabiPakistan0.27769709543568466
                                                                                      RT_ICON0x44d6300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0PunjabiIndia0.27769709543568466
                                                                                      RT_ICON0x44fbd80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0PunjabiPakistan0.2879924953095685
                                                                                      RT_ICON0x44fbd80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0PunjabiIndia0.2879924953095685
                                                                                      RT_ICON0x450c800x988Device independent bitmap graphic, 24 x 48 x 32, image size 0PunjabiPakistan0.3069672131147541
                                                                                      RT_ICON0x450c800x988Device independent bitmap graphic, 24 x 48 x 32, image size 0PunjabiIndia0.3069672131147541
                                                                                      RT_ICON0x4516080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0PunjabiPakistan0.3351063829787234
                                                                                      RT_ICON0x4516080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0PunjabiIndia0.3351063829787234
                                                                                      RT_ICON0x451ad80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0PunjabiPakistan0.279317697228145
                                                                                      RT_ICON0x451ad80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0PunjabiIndia0.279317697228145
                                                                                      RT_ICON0x4529800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0PunjabiPakistan0.36913357400722024
                                                                                      RT_ICON0x4529800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0PunjabiIndia0.36913357400722024
                                                                                      RT_ICON0x4532280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0PunjabiPakistan0.3922811059907834
                                                                                      RT_ICON0x4532280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0PunjabiIndia0.3922811059907834
                                                                                      RT_ICON0x4538f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0PunjabiPakistan0.39667630057803466
                                                                                      RT_ICON0x4538f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0PunjabiIndia0.39667630057803466
                                                                                      RT_ICON0x453e580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0PunjabiPakistan0.27375518672199173
                                                                                      RT_ICON0x453e580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0PunjabiIndia0.27375518672199173
                                                                                      RT_ICON0x4564000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0PunjabiPakistan0.30558161350844276
                                                                                      RT_ICON0x4564000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0PunjabiIndia0.30558161350844276
                                                                                      RT_ICON0x4574a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0PunjabiPakistan0.3233606557377049
                                                                                      RT_ICON0x4574a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0PunjabiIndia0.3233606557377049
                                                                                      RT_ICON0x457e300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0PunjabiPakistan0.3546099290780142
                                                                                      RT_ICON0x457e300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0PunjabiIndia0.3546099290780142
                                                                                      RT_STRING0x45ca480x3dcdataPunjabiPakistan0.4605263157894737
                                                                                      RT_STRING0x45ca480x3dcdataPunjabiIndia0.4605263157894737
                                                                                      RT_STRING0x45ce280x48adataPunjabiPakistan0.4509466437177281
                                                                                      RT_STRING0x45ce280x48adataPunjabiIndia0.4509466437177281
                                                                                      RT_STRING0x45d2b80x858dataPunjabiPakistan0.40823970037453183
                                                                                      RT_STRING0x45d2b80x858dataPunjabiIndia0.40823970037453183
                                                                                      RT_STRING0x45db100x38edataPunjabiPakistan0.47802197802197804
                                                                                      RT_STRING0x45db100x38edataPunjabiIndia0.47802197802197804
                                                                                      RT_STRING0x45dea00x3e6dataPunjabiPakistan0.467935871743487
                                                                                      RT_STRING0x45dea00x3e6dataPunjabiIndia0.467935871743487
                                                                                      RT_STRING0x45e2880x542dataPunjabiPakistan0.4427934621099554
                                                                                      RT_STRING0x45e2880x542dataPunjabiIndia0.4427934621099554
                                                                                      RT_ACCELERATOR0x45ab300x40dataPunjabiPakistan0.890625
                                                                                      RT_ACCELERATOR0x45ab300x40dataPunjabiIndia0.890625
                                                                                      RT_ACCELERATOR0x45ab700x30dataPunjabiPakistan0.9583333333333334
                                                                                      RT_ACCELERATOR0x45ab700x30dataPunjabiIndia0.9583333333333334
                                                                                      RT_GROUP_CURSOR0x45c8780x30data0.9375
                                                                                      RT_GROUP_ICON0x44b9480x30dataPunjabiPakistan0.9375
                                                                                      RT_GROUP_ICON0x44b9480x30dataPunjabiIndia0.9375
                                                                                      RT_GROUP_ICON0x4582980x76dataPunjabiPakistan0.6779661016949152
                                                                                      RT_GROUP_ICON0x4582980x76dataPunjabiIndia0.6779661016949152
                                                                                      RT_GROUP_ICON0x451a700x68dataPunjabiPakistan0.7019230769230769
                                                                                      RT_GROUP_ICON0x451a700x68dataPunjabiIndia0.7019230769230769
                                                                                      RT_VERSION0x45c8a80x19cdata0.5776699029126213
                                                                                      None0x45abb00xadataPunjabiPakistan1.8
                                                                                      None0x45abb00xadataPunjabiIndia1.8
                                                                                      None0x45aba00xadataPunjabiPakistan1.8
                                                                                      None0x45aba00xadataPunjabiIndia1.8
                                                                                      DLLImport
                                                                                      KERNEL32.dllEnumCalendarInfoA, GlobalAddAtomA, EndUpdateResourceW, InterlockedDecrement, GetCurrentProcess, GetComputerNameW, GetModuleHandleW, GetCommConfig, GetProcessHeap, GetWindowsDirectoryA, SizeofResource, EnumResourceLanguagesA, CreateFileW, GetOverlappedResult, ExitThread, InterlockedExchange, GetLastError, SetLastError, GetProcAddress, VirtualAlloc, BackupWrite, GetNativeSystemInfo, OpenMutexA, LocalAlloc, CreateHardLinkW, FindFirstVolumeMountPointW, BeginUpdateResourceA, OpenJobObjectW, DeviceIoControl, GlobalFindAtomW, VirtualProtect, _lopen, GetVersionExA, FindAtomW, GetFileInformationByHandle, OpenFileMappingA, TlsFree, LCMapStringW, lstrcpyA, LoadLibraryA, GetFullPathNameW, InterlockedIncrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, RaiseException, RtlUnwind, HeapFree, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, TerminateProcess, IsDebuggerPresent, HeapAlloc, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, TlsGetValue, TlsAlloc, TlsSetValue, GetCurrentThreadId, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapSize, HeapReAlloc, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, GetLocaleInfoA, GetStringTypeA, MultiByteToWideChar, GetStringTypeW, InitializeCriticalSectionAndSpinCount, LCMapStringA, WideCharToMultiByte
                                                                                      USER32.dllSetClipboardViewer
                                                                                      GDI32.dllGetDeviceGammaRamp
                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                      PunjabiPakistan
                                                                                      PunjabiIndia
                                                                                      Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:15:26:54
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\Desktop\27i42a6Qag.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user\Desktop\27i42a6Qag.exe
                                                                                      Imagebase:0x400000
                                                                                      File size:247'808 bytes
                                                                                      MD5 hash:9527ADB6094EAB92B0A8C22E2BFFE713
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1282976357.0000000000AD9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1282861339.0000000000AB0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1283124377.00000000024C1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1283124377.00000000024C1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000003.1211760629.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1283076802.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1283076802.00000000024A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:2
                                                                                      Start time:15:26:59
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\explorer.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\Explorer.EXE
                                                                                      Imagebase:0x7ff70ffd0000
                                                                                      File size:5'141'208 bytes
                                                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:3
                                                                                      Start time:15:26:59
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                      Imagebase:0x7ff7b4ee0000
                                                                                      File size:55'320 bytes
                                                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:4
                                                                                      Start time:15:27:00
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\SgrmBroker.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                      Imagebase:0x7ff7d5c60000
                                                                                      File size:329'504 bytes
                                                                                      MD5 hash:3BA1A18A0DC30A0545E7765CB97D8E63
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:moderate
                                                                                      Has exited:false

                                                                                      Target ID:5
                                                                                      Start time:15:27:00
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                      Imagebase:0x7ff7b4ee0000
                                                                                      File size:55'320 bytes
                                                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:6
                                                                                      Start time:15:27:00
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                                                                                      Imagebase:0x7ff7b4ee0000
                                                                                      File size:55'320 bytes
                                                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:7
                                                                                      Start time:15:27:00
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                      Imagebase:0x7ff7b4ee0000
                                                                                      File size:55'320 bytes
                                                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:8
                                                                                      Start time:15:27:00
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
                                                                                      Imagebase:0x7ff7b4ee0000
                                                                                      File size:55'320 bytes
                                                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:10
                                                                                      Start time:15:27:00
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                                                                                      Imagebase:0x7ff7b4ee0000
                                                                                      File size:55'320 bytes
                                                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:11
                                                                                      Start time:15:27:04
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                                                                      Imagebase:0x7ff7b4ee0000
                                                                                      File size:55'320 bytes
                                                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Target ID:13
                                                                                      Start time:15:27:19
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Roaming\atjdeae
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user\AppData\Roaming\atjdeae
                                                                                      Imagebase:0x400000
                                                                                      File size:247'808 bytes
                                                                                      MD5 hash:9527ADB6094EAB92B0A8C22E2BFFE713
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000003.1464709517.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.1516321517.0000000000A11000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.1516321517.0000000000A11000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000D.00000002.1515807475.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000D.00000002.1515885415.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000D.00000002.1515885415.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000D.00000002.1516424096.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      Has exited:true

                                                                                      Target ID:14
                                                                                      Start time:17:24:49
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user~1\AppData\Local\Temp\CAC0.exe
                                                                                      Imagebase:0x400000
                                                                                      File size:2'017'792 bytes
                                                                                      MD5 hash:EE1049D8F8248D11080582FE27F96843
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000E.00000002.1562660242.00000000051A4000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      Has exited:true

                                                                                      Target ID:15
                                                                                      Start time:17:24:50
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\CAC0.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user~1\AppData\Local\Temp\CAC0.exe
                                                                                      Imagebase:0x400000
                                                                                      File size:2'017'792 bytes
                                                                                      MD5 hash:EE1049D8F8248D11080582FE27F96843
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:16
                                                                                      Start time:17:24:52
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Users\user~1\AppData\Local\Temp\D89C.exe
                                                                                      Imagebase:0x7ff7285b0000
                                                                                      File size:8'885'269 bytes
                                                                                      MD5 hash:033576B4B54E5CB69EC8491FF6624C9F
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:17
                                                                                      Start time:17:24:55
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\E212.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user~1\AppData\Local\Temp\E212.exe
                                                                                      Imagebase:0x920000
                                                                                      File size:4'765'600 bytes
                                                                                      MD5 hash:62C9E15DD99C7D3B7367DCF220579C54
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:.Net C# or VB.NET
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000011.00000000.1602475035.0000000000922000.00000020.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\E212.exe, Author: Joe Security
                                                                                      • Rule: INDICATOR_EXE_Packed_DotNetReactor, Description: Detects executables packed with unregistered version of .NET Reactor, Source: C:\Users\user\AppData\Local\Temp\E212.exe, Author: ditekSHen
                                                                                      Has exited:false

                                                                                      Target ID:18
                                                                                      Start time:17:24:56
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\E753.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user~1\AppData\Local\Temp\E753.exe
                                                                                      Imagebase:0x400000
                                                                                      File size:600'849 bytes
                                                                                      MD5 hash:08DEB048589E4E6D6F16AB66BD1020F8
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_LummaCStealer_2, Description: Yara detected LummaC Stealer, Source: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_LummaCStealer_2, Description: Yara detected LummaC Stealer, Source: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                      Has exited:true

                                                                                      Target ID:19
                                                                                      Start time:17:24:56
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff75da10000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:20
                                                                                      Start time:17:24:59
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\F280.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user~1\AppData\Local\Temp\F280.exe
                                                                                      Imagebase:0x400000
                                                                                      File size:247'808 bytes
                                                                                      MD5 hash:727A16734E04C21EE28B8981510BF802
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000014.00000002.1710606855.00000000025D1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000014.00000002.1709868553.0000000000B18000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000014.00000002.1709725092.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000014.00000002.1709725092.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000014.00000002.1709564637.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000014.00000003.1653752830.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Has exited:true

                                                                                      Target ID:21
                                                                                      Start time:17:25:01
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\ProgramData\Drivers\csrss.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\ProgramData\Drivers\csrss.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:2'017'792 bytes
                                                                                      MD5 hash:EE1049D8F8248D11080582FE27F96843
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000015.00000002.1682638655.0000000005600000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      Has exited:true

                                                                                      Target ID:22
                                                                                      Start time:17:25:01
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\D89C.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Users\user~1\AppData\Local\Temp\D89C.exe
                                                                                      Imagebase:0x7ff7285b0000
                                                                                      File size:8'885'269 bytes
                                                                                      MD5 hash:033576B4B54E5CB69EC8491FF6624C9F
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:23
                                                                                      Start time:17:25:02
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\ProgramData\Drivers\csrss.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\ProgramData\Drivers\csrss.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:2'017'792 bytes
                                                                                      MD5 hash:EE1049D8F8248D11080582FE27F96843
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:24
                                                                                      Start time:17:25:03
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\2BD.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user~1\AppData\Local\Temp\2BD.exe
                                                                                      Imagebase:0x400000
                                                                                      File size:4'327'808 bytes
                                                                                      MD5 hash:76008C3F4A84021E02E9AEEC9FB1C9D8
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Glupteba, Description: Yara detected Glupteba, Source: 00000018.00000003.1710868011.0000000003BD2000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000018.00000002.3832224383.0000000002EA0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000018.00000002.3830617319.0000000002A9F000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: JoeSecurity_Glupteba, Description: Yara detected Glupteba, Source: 00000018.00000002.3811903783.0000000000843000.00000040.00000001.01000000.0000001C.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Glupteba, Description: Yara detected Glupteba, Source: 00000018.00000002.3832224383.00000000032E3000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Has exited:false

                                                                                      Target ID:25
                                                                                      Start time:17:25:07
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\153C.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Users\user~1\AppData\Local\Temp\153C.exe
                                                                                      Imagebase:0x400000
                                                                                      File size:7'413'381 bytes
                                                                                      MD5 hash:A43D9BCAD3770524E73836B410837BFC
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:26
                                                                                      Start time:17:25:08
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\is-SE9SP.tmp\153C.tmp
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user~1\AppData\Local\Temp\is-SE9SP.tmp\153C.tmp" /SL5="$70050,7161388,54272,C:\Users\user~1\AppData\Local\Temp\153C.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:704'000 bytes
                                                                                      MD5 hash:DC768C91E97B42F218028EFA028C41CC
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:29
                                                                                      Start time:17:25:09
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\ProgramData\Drivers\csrss.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\ProgramData\Drivers\csrss.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:2'017'792 bytes
                                                                                      MD5 hash:EE1049D8F8248D11080582FE27F96843
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000001D.00000002.1771997732.0000000005600000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                      Has exited:true

                                                                                      Target ID:30
                                                                                      Start time:17:25:10
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\cmd.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\Sysnative\cmd.exe /C fodhelper
                                                                                      Imagebase:0x7ff7a8360000
                                                                                      File size:289'792 bytes
                                                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:31
                                                                                      Start time:17:25:10
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\regsvr32.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:regsvr32 /s C:\Users\user~1\AppData\Local\Temp\2635.dll
                                                                                      Imagebase:0x7ff765670000
                                                                                      File size:25'088 bytes
                                                                                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:32
                                                                                      Start time:17:25:10
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline: /s C:\Users\user~1\AppData\Local\Temp\2635.dll
                                                                                      Imagebase:0x9a0000
                                                                                      File size:20'992 bytes
                                                                                      MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:33
                                                                                      Start time:17:25:10
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\153C.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\153C.exe" /SPAWNWND=$203E6 /NOTIFYWND=$70050
                                                                                      Imagebase:0x400000
                                                                                      File size:7'413'381 bytes
                                                                                      MD5 hash:A43D9BCAD3770524E73836B410837BFC
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:34
                                                                                      Start time:17:25:10
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\ProgramData\Drivers\csrss.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\ProgramData\Drivers\csrss.exe"
                                                                                      Imagebase:0x400000
                                                                                      File size:2'017'792 bytes
                                                                                      MD5 hash:EE1049D8F8248D11080582FE27F96843
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:35
                                                                                      Start time:17:25:10
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff75da10000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:36
                                                                                      Start time:17:25:10
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\SysWOW64\explorer.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\SysWOW64\explorer.exe
                                                                                      Imagebase:0xf60000
                                                                                      File size:4'514'184 bytes
                                                                                      MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:37
                                                                                      Start time:17:25:11
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\fodhelper.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:fodhelper
                                                                                      Imagebase:0x7ff7c0a40000
                                                                                      File size:49'664 bytes
                                                                                      MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:38
                                                                                      Start time:17:25:11
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Users\user\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user~1\AppData\Local\Temp\is-CHT1E.tmp\153C.tmp" /SL5="$303F6,7161388,54272,C:\Users\user\AppData\Local\Temp\153C.exe" /SPAWNWND=$203E6 /NOTIFYWND=$70050
                                                                                      Imagebase:0x400000
                                                                                      File size:704'000 bytes
                                                                                      MD5 hash:DC768C91E97B42F218028EFA028C41CC
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:false

                                                                                      Target ID:39
                                                                                      Start time:17:25:11
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\explorer.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\explorer.exe
                                                                                      Imagebase:0x7ff70ffd0000
                                                                                      File size:5'141'208 bytes
                                                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:40
                                                                                      Start time:17:25:12
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\fodhelper.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Windows\system32\fodhelper.exe"
                                                                                      Imagebase:0x7ff7c0a40000
                                                                                      File size:49'664 bytes
                                                                                      MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                                                                      Has elevated privileges:false
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Target ID:42
                                                                                      Start time:17:25:13
                                                                                      Start date:21/12/2023
                                                                                      Path:C:\Windows\System32\fodhelper.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Windows\system32\fodhelper.exe"
                                                                                      Imagebase:0x7ff7c0a40000
                                                                                      File size:49'664 bytes
                                                                                      MD5 hash:85018BE1FD913656BC9FF541F017EACD
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Has exited:true

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:6.2%
                                                                                        Dynamic/Decrypted Code Coverage:51%
                                                                                        Signature Coverage:39.2%
                                                                                        Total number of Nodes:102
                                                                                        Total number of Limit Nodes:4
                                                                                        execution_graph 4401 adf8ad 4402 adf8bc 4401->4402 4405 ae004d 4402->4405 4407 ae0068 4405->4407 4406 ae0071 CreateToolhelp32Snapshot 4406->4407 4408 ae008d Module32First 4406->4408 4407->4406 4407->4408 4409 ae009c 4408->4409 4410 adf8c5 4408->4410 4412 adfd0c 4409->4412 4413 adfd37 4412->4413 4414 adfd48 VirtualAlloc 4413->4414 4415 adfd80 4413->4415 4414->4415 4415->4415 4416 402f03 4417 402f11 4416->4417 4419 402f9d 4417->4419 4420 401969 4417->4420 4421 401977 4420->4421 4422 4019ac Sleep 4421->4422 4423 4019c7 4422->4423 4425 4019d8 4423->4425 4426 401590 4423->4426 4425->4419 4427 4015a1 4426->4427 4428 401639 NtDuplicateObject 4427->4428 4429 401755 4427->4429 4428->4429 4430 401656 NtCreateSection 4428->4430 4429->4425 4431 4016d6 NtCreateSection 4430->4431 4432 40167c NtMapViewOfSection 4430->4432 4431->4429 4434 401702 4431->4434 4432->4431 4433 40169f NtMapViewOfSection 4432->4433 4433->4431 4437 4016bd 4433->4437 4434->4429 4435 40170c NtMapViewOfSection 4434->4435 4435->4429 4436 401733 NtMapViewOfSection 4435->4436 4436->4429 4437->4431 4605 402e83 4607 402dde 4605->4607 4606 401969 8 API calls 4608 402e93 4606->4608 4607->4605 4607->4606 4607->4608 4438 ab003c 4439 ab0049 4438->4439 4451 ab0e0f SetErrorMode SetErrorMode 4439->4451 4444 ab0265 4445 ab02ce VirtualProtect 4444->4445 4447 ab030b 4445->4447 4446 ab0439 VirtualFree 4450 ab04be LoadLibraryA 4446->4450 4447->4446 4449 ab08c7 4450->4449 4452 ab0223 4451->4452 4453 ab0d90 4452->4453 4454 ab0dad 4453->4454 4455 ab0dbb GetPEB 4454->4455 4456 ab0238 VirtualAlloc 4454->4456 4455->4456 4456->4444 4547 40159b 4548 4015ae 4547->4548 4549 401639 NtDuplicateObject 4548->4549 4558 401755 4548->4558 4550 401656 NtCreateSection 4549->4550 4549->4558 4551 4016d6 NtCreateSection 4550->4551 4552 40167c NtMapViewOfSection 4550->4552 4554 401702 4551->4554 4551->4558 4552->4551 4553 40169f NtMapViewOfSection 4552->4553 4553->4551 4555 4016bd 4553->4555 4556 40170c NtMapViewOfSection 4554->4556 4554->4558 4555->4551 4557 401733 NtMapViewOfSection 4556->4557 4556->4558 4557->4558 4593 402ee4 4594 402edc 4593->4594 4595 401969 8 API calls 4594->4595 4596 402f9d 4594->4596 4595->4596 4465 ab0001 4466 ab0005 4465->4466 4471 ab092b GetPEB 4466->4471 4468 ab0030 4473 ab003c 4468->4473 4472 ab0972 4471->4472 4472->4468 4474 ab0049 4473->4474 4475 ab0e0f 2 API calls 4474->4475 4476 ab0223 4475->4476 4477 ab0d90 GetPEB 4476->4477 4478 ab0238 VirtualAlloc 4477->4478 4479 ab0265 4478->4479 4480 ab02ce VirtualProtect 4479->4480 4482 ab030b 4480->4482 4481 ab0439 VirtualFree 4485 ab04be LoadLibraryA 4481->4485 4482->4481 4484 ab08c7 4485->4484 4486 ab0005 4487 ab092b GetPEB 4486->4487 4488 ab0030 4487->4488 4489 ab003c 7 API calls 4488->4489 4490 ab0038 4489->4490 4461 adf89c 4462 adf8ad 4461->4462 4463 ae004d 3 API calls 4462->4463 4464 adf8c5 4463->4464 4491 401975 4492 401977 4491->4492 4493 4019ac Sleep 4492->4493 4494 4019c7 4493->4494 4495 401590 7 API calls 4494->4495 4496 4019d8 4494->4496 4495->4496 4577 4029ba 4578 4029ca 4577->4578 4579 402a0f LdrLoadDll 4578->4579 4580 402a1f 4579->4580

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 85 401590-4015c0 92 4015c6-4015e3 call 40120e 85->92 93 4015cd 85->93 97 4015e5 92->97 98 4015e8-4015ed 92->98 93->92 97->98 100 401913-40191b 98->100 101 4015f3-401604 98->101 100->98 106 401920-401966 call 40120e 100->106 104 401911 101->104 105 40160a-401633 101->105 104->106 105->104 114 401639-401650 NtDuplicateObject 105->114 114->104 116 401656-40167a NtCreateSection 114->116 118 4016d6-4016fc NtCreateSection 116->118 119 40167c-40169d NtMapViewOfSection 116->119 118->104 121 401702-401706 118->121 119->118 120 40169f-4016bb NtMapViewOfSection 119->120 120->118 123 4016bd-4016d3 120->123 121->104 124 40170c-40172d NtMapViewOfSection 121->124 123->118 124->104 126 401733-40174f NtMapViewOfSection 124->126 126->104 129 401755 call 40175a 126->129
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 569c601533bfa5fc76acd0aceccd82dced2ec0ba9158162e35254d0d933d7b6e
                                                                                        • Instruction ID: d6964195f2ae178c179c3b7a32e304a619fe45f2cb2dcf097c8130f3d204b23e
                                                                                        • Opcode Fuzzy Hash: 569c601533bfa5fc76acd0aceccd82dced2ec0ba9158162e35254d0d933d7b6e
                                                                                        • Instruction Fuzzy Hash: 64616FB0904205FFEB208F91CC58FAF7BB8EF81710F10416AFA12BA1E5D6749941DB65
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 132 40159b-4015c0 137 4015c6-4015e3 call 40120e 132->137 138 4015cd 132->138 142 4015e5 137->142 143 4015e8-4015ed 137->143 138->137 142->143 145 401913-40191b 143->145 146 4015f3-401604 143->146 145->143 151 401920-401966 call 40120e 145->151 149 401911 146->149 150 40160a-401633 146->150 149->151 150->149 159 401639-401650 NtDuplicateObject 150->159 159->149 161 401656-40167a NtCreateSection 159->161 163 4016d6-4016fc NtCreateSection 161->163 164 40167c-40169d NtMapViewOfSection 161->164 163->149 166 401702-401706 163->166 164->163 165 40169f-4016bb NtMapViewOfSection 164->165 165->163 168 4016bd-4016d3 165->168 166->149 169 40170c-40172d NtMapViewOfSection 166->169 168->163 169->149 171 401733-40174f NtMapViewOfSection 169->171 171->149 174 401755 call 40175a 171->174
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: bae20a228bd41bc7813985564ad54ad8a6399e0ad18c72377fec9941621639a0
                                                                                        • Instruction ID: ff81ed2e81490e93a7bfe721f9c6a4d9304ec08e35c355afa89281eda0ffd623
                                                                                        • Opcode Fuzzy Hash: bae20a228bd41bc7813985564ad54ad8a6399e0ad18c72377fec9941621639a0
                                                                                        • Instruction Fuzzy Hash: 3E5109B5900249BFEB208F91CC49FAB7BB8FF85710F144169FA11BA2E5D6749941CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 177 4015b0-4015c0 180 4015c6-4015e3 call 40120e 177->180 181 4015cd 177->181 185 4015e5 180->185 186 4015e8-4015ed 180->186 181->180 185->186 188 401913-40191b 186->188 189 4015f3-401604 186->189 188->186 194 401920-401966 call 40120e 188->194 192 401911 189->192 193 40160a-401633 189->193 192->194 193->192 202 401639-401650 NtDuplicateObject 193->202 202->192 204 401656-40167a NtCreateSection 202->204 206 4016d6-4016fc NtCreateSection 204->206 207 40167c-40169d NtMapViewOfSection 204->207 206->192 209 401702-401706 206->209 207->206 208 40169f-4016bb NtMapViewOfSection 207->208 208->206 211 4016bd-4016d3 208->211 209->192 212 40170c-40172d NtMapViewOfSection 209->212 211->206 212->192 214 401733-40174f NtMapViewOfSection 212->214 214->192 217 401755 call 40175a 214->217
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 6c4736dca5741fb18473fdef31891e556f9b158cac04651ef2a3a7cb79a50736
                                                                                        • Instruction ID: af686ae4933c2f6004de28669cc23aaadd0110c3f88d1b974755b8c34b4799b2
                                                                                        • Opcode Fuzzy Hash: 6c4736dca5741fb18473fdef31891e556f9b158cac04651ef2a3a7cb79a50736
                                                                                        • Instruction Fuzzy Hash: 0E51F9B5900249BFEB208F91CC48FAF7BB8FF85B10F104169FA11BA2E5D6749941CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 220 4015bc-4015e3 call 40120e 225 4015e5 220->225 226 4015e8-4015ed 220->226 225->226 228 401913-40191b 226->228 229 4015f3-401604 226->229 228->226 234 401920-401966 call 40120e 228->234 232 401911 229->232 233 40160a-401633 229->233 232->234 233->232 242 401639-401650 NtDuplicateObject 233->242 242->232 244 401656-40167a NtCreateSection 242->244 246 4016d6-4016fc NtCreateSection 244->246 247 40167c-40169d NtMapViewOfSection 244->247 246->232 249 401702-401706 246->249 247->246 248 40169f-4016bb NtMapViewOfSection 247->248 248->246 251 4016bd-4016d3 248->251 249->232 252 40170c-40172d NtMapViewOfSection 249->252 251->246 252->232 254 401733-40174f NtMapViewOfSection 252->254 254->232 257 401755 call 40175a 254->257
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 72661907227a9452eb25ab953c02bdcf5a827517e06e297a0d085dc110f4c5bf
                                                                                        • Instruction ID: 765dedf92b6036aea99e2596c7c6646b0bcbba97602321f23575c560d9e65fb8
                                                                                        • Opcode Fuzzy Hash: 72661907227a9452eb25ab953c02bdcf5a827517e06e297a0d085dc110f4c5bf
                                                                                        • Instruction Fuzzy Hash: 1451E8B5900249BFEF208F91CC48FDF7BB8FF85B10F104169FA11AA2A5D6749945CB64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 260 4015cb-4015e3 call 40120e 266 4015e5 260->266 267 4015e8-4015ed 260->267 266->267 269 401913-40191b 267->269 270 4015f3-401604 267->270 269->267 275 401920-401966 call 40120e 269->275 273 401911 270->273 274 40160a-401633 270->274 273->275 274->273 283 401639-401650 NtDuplicateObject 274->283 283->273 285 401656-40167a NtCreateSection 283->285 287 4016d6-4016fc NtCreateSection 285->287 288 40167c-40169d NtMapViewOfSection 285->288 287->273 290 401702-401706 287->290 288->287 289 40169f-4016bb NtMapViewOfSection 288->289 289->287 292 4016bd-4016d3 289->292 290->273 293 40170c-40172d NtMapViewOfSection 290->293 292->287 293->273 295 401733-40174f NtMapViewOfSection 293->295 295->273 298 401755 call 40175a 295->298
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 004f83838c091370c792dd4fcb680897e20f1790ca1ffba750393c7614aa26f8
                                                                                        • Instruction ID: 60f1a669064b898f2f8cfe764b4cdaf5e199705ebcb5ef48edc51869d28594cd
                                                                                        • Opcode Fuzzy Hash: 004f83838c091370c792dd4fcb680897e20f1790ca1ffba750393c7614aa26f8
                                                                                        • Instruction Fuzzy Hash: 2C51FAB1900249BFEF208F91CC48F9FBBB8FF85B10F104169FA11AA2A5D7749941CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 301 ae004d-ae0066 302 ae0068-ae006a 301->302 303 ae006c 302->303 304 ae0071-ae007d CreateToolhelp32Snapshot 302->304 303->304 305 ae007f-ae0085 304->305 306 ae008d-ae009a Module32First 304->306 305->306 311 ae0087-ae008b 305->311 307 ae009c-ae009d call adfd0c 306->307 308 ae00a3-ae00ab 306->308 312 ae00a2 307->312 311->302 311->306 312->308
                                                                                        APIs
                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00AE0075
                                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 00AE0095
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282976357.0000000000AD9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AD9000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ad9000_27i42a6Qag.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                        • String ID:
                                                                                        • API String ID: 3833638111-0
                                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction ID: 7afbc9a79759f3ed47ad03414f7439551a36467d3684db9fdf2554877fae8804
                                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction Fuzzy Hash: 54F062351007106FD7203BFAA88DF6B77E8BF49725F100629F682914C0DAB0E8858661
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 317 4029ba-4029c3 318 4029d3 317->318 319 4029ca-4029cf 317->319 318->319 320 4029d6-402a0b call 40120e 318->320 319->320 329 402a0f-402a1d LdrLoadDll 320->329 330 402a26-402a71 call 40120e 329->330 331 402a1f 329->331 331->330
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 8b4368bb53e1649655da800b8e3771367f61da053ffbe47dde7c34dc5595736a
                                                                                        • Instruction ID: ddfd821467dba8d9e3be05996510f596060048204c77d2b9bdf6330f9e046059
                                                                                        • Opcode Fuzzy Hash: 8b4368bb53e1649655da800b8e3771367f61da053ffbe47dde7c34dc5595736a
                                                                                        • Instruction Fuzzy Hash: 5C11E571708104E7D6209A449B4EF6B3724AB50B00F308077E5077A1C0D9FD9A07BBAF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 0 ab003c-ab0047 1 ab0049 0->1 2 ab004c-ab0263 call ab0a3f call ab0e0f call ab0d90 VirtualAlloc 0->2 1->2 17 ab028b-ab0292 2->17 18 ab0265-ab0289 call ab0a69 2->18 20 ab02a1-ab02b0 17->20 22 ab02ce-ab03c2 VirtualProtect call ab0cce call ab0ce7 18->22 20->22 23 ab02b2-ab02cc 20->23 29 ab03d1-ab03e0 22->29 23->20 30 ab0439-ab04b8 VirtualFree 29->30 31 ab03e2-ab0437 call ab0ce7 29->31 32 ab04be-ab04cd 30->32 33 ab05f4-ab05fe 30->33 31->29 36 ab04d3-ab04dd 32->36 37 ab077f-ab0789 33->37 38 ab0604-ab060d 33->38 36->33 40 ab04e3-ab0505 36->40 41 ab078b-ab07a3 37->41 42 ab07a6-ab07b0 37->42 38->37 43 ab0613-ab0637 38->43 51 ab0517-ab0520 40->51 52 ab0507-ab0515 40->52 41->42 44 ab086e-ab08be LoadLibraryA 42->44 45 ab07b6-ab07cb 42->45 46 ab063e-ab0648 43->46 50 ab08c7-ab08f9 44->50 48 ab07d2-ab07d5 45->48 46->37 49 ab064e-ab065a 46->49 53 ab07d7-ab07e0 48->53 54 ab0824-ab0833 48->54 49->37 55 ab0660-ab066a 49->55 56 ab08fb-ab0901 50->56 57 ab0902-ab091d 50->57 58 ab0526-ab0547 51->58 52->58 59 ab07e2 53->59 60 ab07e4-ab0822 53->60 62 ab0839-ab083c 54->62 61 ab067a-ab0689 55->61 56->57 63 ab054d-ab0550 58->63 59->54 60->48 64 ab068f-ab06b2 61->64 65 ab0750-ab077a 61->65 62->44 66 ab083e-ab0847 62->66 68 ab05e0-ab05ef 63->68 69 ab0556-ab056b 63->69 70 ab06ef-ab06fc 64->70 71 ab06b4-ab06ed 64->71 65->46 72 ab084b-ab086c 66->72 73 ab0849 66->73 68->36 76 ab056f-ab057a 69->76 77 ab056d 69->77 74 ab074b 70->74 75 ab06fe-ab0748 70->75 71->70 72->62 73->44 74->61 75->74 80 ab059b-ab05bb 76->80 81 ab057c-ab0599 76->81 77->68 84 ab05bd-ab05db 80->84 81->84 84->63
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 00AB024D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282861339.0000000000AB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ab0000_27i42a6Qag.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID: cess$kernel32.dll
                                                                                        • API String ID: 4275171209-1230238691
                                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                        • Instruction ID: d3bf738b4cd120a3d85becea6b80a218c6dc8827ca39ab706519755c30fefd2e
                                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                        • Instruction Fuzzy Hash: 2F526974A00229DFDB64CF58C984BADBBB5BF09304F1480D9E54DAB252DB30AE95DF14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 314 ab0e0f-ab0e24 SetErrorMode * 2 315 ab0e2b-ab0e2c 314->315 316 ab0e26 314->316 316->315
                                                                                        APIs
                                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,00AB0223,?,?), ref: 00AB0E19
                                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,00AB0223,?,?), ref: 00AB0E1E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282861339.0000000000AB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ab0000_27i42a6Qag.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorMode
                                                                                        • String ID:
                                                                                        • API String ID: 2340568224-0
                                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                        • Instruction ID: cde6308549a477598ce6ab385e860f7175c70ada6a0311b4e7c89d6ca1729712
                                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                        • Instruction Fuzzy Hash: 20D0123114512877D7002B94DC09BCE7B1CDF05B62F008411FB0DD9081C770994046E5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 343 4029c5-402a0b call 40120e 354 402a0f-402a1d LdrLoadDll 343->354 355 402a26-402a71 call 40120e 354->355 356 402a1f 354->356 356->355
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 630f67e63f4c9d6cadc1f4ef28869250e9dd95ac73f78134dda1cef590dfe083
                                                                                        • Instruction ID: eda82e36109819710fc28ef01b941f30aa1b457bd77d6c907d6690057fca41fa
                                                                                        • Opcode Fuzzy Hash: 630f67e63f4c9d6cadc1f4ef28869250e9dd95ac73f78134dda1cef590dfe083
                                                                                        • Instruction Fuzzy Hash: 3C01C471708205E7DA60DA949A4EB6B7710AB51B10F308077E5037A1C4DAFD9A07FB6B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 368 4029d1-4029d3 370 4029d6-402a0b call 40120e 368->370 371 4029ca-4029cf 368->371 380 402a0f-402a1d LdrLoadDll 370->380 371->370 381 402a26-402a71 call 40120e 380->381 382 402a1f 380->382 382->381
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 8aebd7c2dfb35844096bdf04bcf18f9291abc38b44631a4f8f553a04b448b611
                                                                                        • Instruction ID: 27f311fed6bd4bb195386d6e886048742e5b6b48a655c0a394e70793ed6bf28f
                                                                                        • Opcode Fuzzy Hash: 8aebd7c2dfb35844096bdf04bcf18f9291abc38b44631a4f8f553a04b448b611
                                                                                        • Instruction Fuzzy Hash: E0018071708105E7DA609A449B4EB6B7324BB50B10F308477E5077A1C4DAFD9A07BB6F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 394 4029d5-402a0b call 40120e 402 402a0f-402a1d LdrLoadDll 394->402 403 402a26-402a71 call 40120e 402->403 404 402a1f 402->404 404->403
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 14f9d75437b26c4e33ab762a249f6d4a6897a4cf10a17b4738070ea496484bd2
                                                                                        • Instruction ID: 6c082c2f6db60d75b034223dafbed04b71575a1e0537fab93527f59567f6cb96
                                                                                        • Opcode Fuzzy Hash: 14f9d75437b26c4e33ab762a249f6d4a6897a4cf10a17b4738070ea496484bd2
                                                                                        • Instruction Fuzzy Hash: DB01B531708105E7DB60DA409A4DF5F7720BB50B10F208577E5077A1C4DAF99A17EB9B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 416 4029e2-402a0b call 40120e 423 402a0f-402a1d LdrLoadDll 416->423 424 402a26-402a71 call 40120e 423->424 425 402a1f 423->425 425->424
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: b2d371f82e3e545a267ab12f2e2f0a58ec4b54f775fd64736b106f9591d7a7c3
                                                                                        • Instruction ID: daf8977218c418413866257df5c9087131837fd98e0c4230724de407841e0162
                                                                                        • Opcode Fuzzy Hash: b2d371f82e3e545a267ab12f2e2f0a58ec4b54f775fd64736b106f9591d7a7c3
                                                                                        • Instruction Fuzzy Hash: 3801DF31708104E7DB209A848A4DB5E7320AB40B10F208577E507BA1C0DAF9AA07AFAB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 437 4029e9-402a0b call 40120e 442 402a0f-402a1d LdrLoadDll 437->442 443 402a26-402a71 call 40120e 442->443 444 402a1f 442->444 444->443
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 9850a57f899f03cbeedeed8d531e786c982b6ed5f0a372be87f463e87495e5bd
                                                                                        • Instruction ID: 5524fd7572365f35614fa46947343296b9db081daee3b4d0816b59f029c0b045
                                                                                        • Opcode Fuzzy Hash: 9850a57f899f03cbeedeed8d531e786c982b6ed5f0a372be87f463e87495e5bd
                                                                                        • Instruction Fuzzy Hash: 2101A731704104E7D7209A448A4EB5E7720AB40704F208477E5067A1C4DAB9EA07AB6B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 456 4029f9-402a1d call 40120e LdrLoadDll 463 402a26-402a71 call 40120e 456->463 464 402a1f 456->464 464->463
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 83fdb88ab79b739a001a2e8c05ea2e4136fbf27434a3016a2f3de2c8c28590ed
                                                                                        • Instruction ID: 2a527b723104a8d4642483acce18f9de5ed6d5a74c4e47f32731208c7d716ef4
                                                                                        • Opcode Fuzzy Hash: 83fdb88ab79b739a001a2e8c05ea2e4136fbf27434a3016a2f3de2c8c28590ed
                                                                                        • Instruction Fuzzy Hash: 1801A231708104E7DB209A849A4DF9F7720AB40B14F208477E5027A1C0DAF9AA07AFAB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: b8285f967374eae4a3c51efe3ce59b098afe428af0dcb557450618fb68c9c18d
                                                                                        • Instruction ID: 1276e484f00ba66cbffb4616bb4d5d076efec51046982770477825c9afbd6400
                                                                                        • Opcode Fuzzy Hash: b8285f967374eae4a3c51efe3ce59b098afe428af0dcb557450618fb68c9c18d
                                                                                        • Instruction Fuzzy Hash: 0F01D2B6708205FADB005A949C62EBB3618AB41755F300637BA13B80F1C57D8513FA6F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: 9a4c6db62cce5b151e284cc19e63a433146ff3755d8681b35f1a2b6972971a8e
                                                                                        • Instruction ID: 0230620869f43b82b90ed4dddf49477c9f5c6c73dade890abd4ec4b7d4a8195a
                                                                                        • Opcode Fuzzy Hash: 9a4c6db62cce5b151e284cc19e63a433146ff3755d8681b35f1a2b6972971a8e
                                                                                        • Instruction Fuzzy Hash: 4801BCB6308205FADB005A949C62FBA3219AB84751F30053BB613BC0F1C53D8513FA2F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: 25088a1f844088f741a859eeb607afc94706ffd20a91742bc3d9f24c23efa0b5
                                                                                        • Instruction ID: 9a4b4ffd5ca22a672d673467c452b15ea5c40039b4ea8ded510267d200494456
                                                                                        • Opcode Fuzzy Hash: 25088a1f844088f741a859eeb607afc94706ffd20a91742bc3d9f24c23efa0b5
                                                                                        • Instruction Fuzzy Hash: 3A01B1B6308205FADB115A949C61A7A3319AB45711F30053BB613B80F2C53D8512FA1F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: f146987f8c0bf49c3ef7592727f3e0a51ae856d021a330616d03f7304a9c3b71
                                                                                        • Instruction ID: 5a2bb716a64f0a1f1a6e426f0b200f3e6862a670896c4db1e76ea4af0659c5ba
                                                                                        • Opcode Fuzzy Hash: f146987f8c0bf49c3ef7592727f3e0a51ae856d021a330616d03f7304a9c3b71
                                                                                        • Instruction Fuzzy Hash: 3101DFB2308205FADB005AD49C62F7A3219AB85715F30453BB623B80F1C63D8512FB2F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00ADFD5D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282976357.0000000000AD9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AD9000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ad9000_27i42a6Qag.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction ID: 7144630ce8bc836c57bd5d82a5c4f11d6de5a5bde1dfa8b0c8e1e3a9d9f8c311
                                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction Fuzzy Hash: CE113F79A00208EFDB01DF98C985E99BBF5AF08350F0580A5F9499B362D371EA50DF80
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: a8f77c5b0aafc3a83b6e9a89fc0125d54fce9978fbcf9d902b8238b221feffd7
                                                                                        • Instruction ID: 689da8ed0bf63c85a60a16fbbe407e4b0918199af58fa2149c0a58fdfe32668e
                                                                                        • Opcode Fuzzy Hash: a8f77c5b0aafc3a83b6e9a89fc0125d54fce9978fbcf9d902b8238b221feffd7
                                                                                        • Instruction Fuzzy Hash: 0E0181B6308105FADB115AD49D52FBA3719AB45751F30453BB613B80F2C53D8512FB2B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: 994369af4d0fa0c447a21c659804c9e18bb6abd6db9e85dcf8f049b878b9c4ba
                                                                                        • Instruction ID: 9477092311c163758adf26378a137d016a4cc75b4861da4fd192d9fcf75081b0
                                                                                        • Opcode Fuzzy Hash: 994369af4d0fa0c447a21c659804c9e18bb6abd6db9e85dcf8f049b878b9c4ba
                                                                                        • Instruction Fuzzy Hash: 25016D72304105FADB119AD09C52EAA3729AB48355F30457BB613BD0F2C63D8552EB2B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282861339.0000000000AB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ab0000_27i42a6Qag.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: .$GetProcAddress.$l
                                                                                        • API String ID: 0-2784972518
                                                                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                        • Instruction ID: 00f02c4ced7b86d09b2a668f4dd2a5171a61823af2bd128203d26ba436d9e7e1
                                                                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                        • Instruction Fuzzy Hash: D0314AB6900609DFDB10CF99C880AEEBBF9FF48364F25414AD841A7352D771EA45CBA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282510858.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_400000_27i42a6Qag.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: db617d040df52ce86714a727618852e39f0ab632dd57857e091b9ba4b58d44d2
                                                                                        • Instruction ID: 2ec65c8763e27a769128aa1c473669608e00f7bf150d98f3fc2086ff3f5b5b64
                                                                                        • Opcode Fuzzy Hash: db617d040df52ce86714a727618852e39f0ab632dd57857e091b9ba4b58d44d2
                                                                                        • Instruction Fuzzy Hash: B231F5719082C28FEB1BAF3885D5591FFB8EE4371230902EBC4809E5D7D778A746874A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282976357.0000000000AD9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AD9000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ad9000_27i42a6Qag.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                        • Instruction ID: 5801857e4060dfb079da0d596dbc72979c4d0642031b3f723f13d11d98c0dd4c
                                                                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                        • Instruction Fuzzy Hash: 87115E72740100AFDB54DF55DC91FA773EAEB89320B29806AED0ACB316E675EC42C760
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.1282861339.0000000000AB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ab0000_27i42a6Qag.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                        • Instruction ID: 41d79baa3593caf25a1a625317812c26bad8a6285713d7d3c4d6d8fadb4bed56
                                                                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                        • Instruction Fuzzy Hash: 1A01AD76A006048FDF21CF64C805FEB33E9FB86316F4945A9D90A9B282E774A9418B90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Execution Graph

                                                                                        Execution Coverage:6.3%
                                                                                        Dynamic/Decrypted Code Coverage:51%
                                                                                        Signature Coverage:0%
                                                                                        Total number of Nodes:102
                                                                                        Total number of Limit Nodes:4
                                                                                        execution_graph 4386 402f03 4388 402f11 4386->4388 4387 402f9d 4388->4387 4390 401969 4388->4390 4391 401977 4390->4391 4392 4019ac Sleep 4391->4392 4393 4019c7 4392->4393 4395 4019d8 4393->4395 4396 401590 4393->4396 4395->4387 4397 4015a1 4396->4397 4398 401639 NtDuplicateObject 4397->4398 4407 401755 4397->4407 4399 401656 NtCreateSection 4398->4399 4398->4407 4400 4016d6 NtCreateSection 4399->4400 4401 40167c NtMapViewOfSection 4399->4401 4403 401702 4400->4403 4400->4407 4401->4400 4402 40169f NtMapViewOfSection 4401->4402 4402->4400 4404 4016bd 4402->4404 4405 40170c NtMapViewOfSection 4403->4405 4403->4407 4404->4400 4406 401733 NtMapViewOfSection 4405->4406 4405->4407 4406->4407 4407->4395 4571 402e83 4573 402dde 4571->4573 4572 401969 8 API calls 4574 402e93 4572->4574 4573->4571 4573->4572 4573->4574 4408 acf9a5 4409 acf9b4 4408->4409 4412 ad0145 4409->4412 4414 ad0160 4412->4414 4413 ad0169 CreateToolhelp32Snapshot 4413->4414 4415 ad0185 Module32First 4413->4415 4414->4413 4414->4415 4416 ad0194 4415->4416 4418 acf9bd 4415->4418 4419 acfe04 4416->4419 4420 acfe2f 4419->4420 4421 acfe78 4420->4421 4422 acfe40 VirtualAlloc 4420->4422 4421->4421 4422->4421 4427 9d0005 4432 9d092b GetPEB 4427->4432 4429 9d0030 4434 9d003c 4429->4434 4433 9d0972 4432->4433 4433->4429 4435 9d0049 4434->4435 4436 9d0e0f 2 API calls 4435->4436 4437 9d0223 4436->4437 4438 9d0d90 GetPEB 4437->4438 4439 9d0238 VirtualAlloc 4438->4439 4440 9d0265 4439->4440 4441 9d02ce VirtualProtect 4440->4441 4443 9d030b 4441->4443 4442 9d0439 VirtualFree 4446 9d04be LoadLibraryA 4442->4446 4443->4442 4445 9d08c7 4446->4445 4513 40159b 4514 4015ae 4513->4514 4515 401639 NtDuplicateObject 4514->4515 4524 401755 4514->4524 4516 401656 NtCreateSection 4515->4516 4515->4524 4517 4016d6 NtCreateSection 4516->4517 4518 40167c NtMapViewOfSection 4516->4518 4520 401702 4517->4520 4517->4524 4518->4517 4519 40169f NtMapViewOfSection 4518->4519 4519->4517 4521 4016bd 4519->4521 4522 40170c NtMapViewOfSection 4520->4522 4520->4524 4521->4517 4523 401733 NtMapViewOfSection 4522->4523 4522->4524 4523->4524 4447 9d0001 4448 9d0005 4447->4448 4449 9d092b GetPEB 4448->4449 4450 9d0030 4449->4450 4451 9d003c 7 API calls 4450->4451 4452 9d0038 4451->4452 4367 9d003c 4368 9d0049 4367->4368 4380 9d0e0f SetErrorMode SetErrorMode 4368->4380 4373 9d0265 4374 9d02ce VirtualProtect 4373->4374 4376 9d030b 4374->4376 4375 9d0439 VirtualFree 4379 9d04be LoadLibraryA 4375->4379 4376->4375 4378 9d08c7 4379->4378 4381 9d0223 4380->4381 4382 9d0d90 4381->4382 4383 9d0dad 4382->4383 4384 9d0dbb GetPEB 4383->4384 4385 9d0238 VirtualAlloc 4383->4385 4384->4385 4385->4373 4559 402ee4 4560 402edc 4559->4560 4561 401969 8 API calls 4560->4561 4562 402f9d 4560->4562 4561->4562 4453 401975 4454 401977 4453->4454 4455 4019ac Sleep 4454->4455 4456 4019c7 4455->4456 4457 401590 7 API calls 4456->4457 4458 4019d8 4456->4458 4457->4458 4459 acf994 4460 acf9a5 4459->4460 4461 ad0145 3 API calls 4460->4461 4462 acf9bd 4461->4462 4543 4029ba 4544 4029ca 4543->4544 4545 402a0f LdrLoadDll 4544->4545 4546 402a1f 4545->4546

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 85 401590-4015c0 92 4015c6-4015e3 call 40120e 85->92 93 4015cd 85->93 97 4015e5 92->97 98 4015e8-4015ed 92->98 93->92 97->98 100 401913-40191b 98->100 101 4015f3-401604 98->101 100->98 104 401920-401966 call 40120e 100->104 105 401911 101->105 106 40160a-401633 101->106 105->104 106->105 114 401639-401650 NtDuplicateObject 106->114 114->105 116 401656-40167a NtCreateSection 114->116 118 4016d6-4016fc NtCreateSection 116->118 119 40167c-40169d NtMapViewOfSection 116->119 118->105 122 401702-401706 118->122 119->118 121 40169f-4016bb NtMapViewOfSection 119->121 121->118 124 4016bd-4016d3 121->124 122->105 125 40170c-40172d NtMapViewOfSection 122->125 124->118 125->105 127 401733-40174f NtMapViewOfSection 125->127 127->105 130 401755 call 40175a 127->130
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 569c601533bfa5fc76acd0aceccd82dced2ec0ba9158162e35254d0d933d7b6e
                                                                                        • Instruction ID: d6964195f2ae178c179c3b7a32e304a619fe45f2cb2dcf097c8130f3d204b23e
                                                                                        • Opcode Fuzzy Hash: 569c601533bfa5fc76acd0aceccd82dced2ec0ba9158162e35254d0d933d7b6e
                                                                                        • Instruction Fuzzy Hash: 64616FB0904205FFEB208F91CC58FAF7BB8EF81710F10416AFA12BA1E5D6749941DB65
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 132 40159b-4015c0 137 4015c6-4015e3 call 40120e 132->137 138 4015cd 132->138 142 4015e5 137->142 143 4015e8-4015ed 137->143 138->137 142->143 145 401913-40191b 143->145 146 4015f3-401604 143->146 145->143 149 401920-401966 call 40120e 145->149 150 401911 146->150 151 40160a-401633 146->151 150->149 151->150 159 401639-401650 NtDuplicateObject 151->159 159->150 161 401656-40167a NtCreateSection 159->161 163 4016d6-4016fc NtCreateSection 161->163 164 40167c-40169d NtMapViewOfSection 161->164 163->150 167 401702-401706 163->167 164->163 166 40169f-4016bb NtMapViewOfSection 164->166 166->163 169 4016bd-4016d3 166->169 167->150 170 40170c-40172d NtMapViewOfSection 167->170 169->163 170->150 172 401733-40174f NtMapViewOfSection 170->172 172->150 175 401755 call 40175a 172->175
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: bae20a228bd41bc7813985564ad54ad8a6399e0ad18c72377fec9941621639a0
                                                                                        • Instruction ID: ff81ed2e81490e93a7bfe721f9c6a4d9304ec08e35c355afa89281eda0ffd623
                                                                                        • Opcode Fuzzy Hash: bae20a228bd41bc7813985564ad54ad8a6399e0ad18c72377fec9941621639a0
                                                                                        • Instruction Fuzzy Hash: 3E5109B5900249BFEB208F91CC49FAB7BB8FF85710F144169FA11BA2E5D6749941CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 177 4015b0-4015c0 180 4015c6-4015e3 call 40120e 177->180 181 4015cd 177->181 185 4015e5 180->185 186 4015e8-4015ed 180->186 181->180 185->186 188 401913-40191b 186->188 189 4015f3-401604 186->189 188->186 192 401920-401966 call 40120e 188->192 193 401911 189->193 194 40160a-401633 189->194 193->192 194->193 202 401639-401650 NtDuplicateObject 194->202 202->193 204 401656-40167a NtCreateSection 202->204 206 4016d6-4016fc NtCreateSection 204->206 207 40167c-40169d NtMapViewOfSection 204->207 206->193 210 401702-401706 206->210 207->206 209 40169f-4016bb NtMapViewOfSection 207->209 209->206 212 4016bd-4016d3 209->212 210->193 213 40170c-40172d NtMapViewOfSection 210->213 212->206 213->193 215 401733-40174f NtMapViewOfSection 213->215 215->193 218 401755 call 40175a 215->218
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 6c4736dca5741fb18473fdef31891e556f9b158cac04651ef2a3a7cb79a50736
                                                                                        • Instruction ID: af686ae4933c2f6004de28669cc23aaadd0110c3f88d1b974755b8c34b4799b2
                                                                                        • Opcode Fuzzy Hash: 6c4736dca5741fb18473fdef31891e556f9b158cac04651ef2a3a7cb79a50736
                                                                                        • Instruction Fuzzy Hash: 0E51F9B5900249BFEB208F91CC48FAF7BB8FF85B10F104169FA11BA2E5D6749941CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 220 4015bc-4015e3 call 40120e 225 4015e5 220->225 226 4015e8-4015ed 220->226 225->226 228 401913-40191b 226->228 229 4015f3-401604 226->229 228->226 232 401920-401966 call 40120e 228->232 233 401911 229->233 234 40160a-401633 229->234 233->232 234->233 242 401639-401650 NtDuplicateObject 234->242 242->233 244 401656-40167a NtCreateSection 242->244 246 4016d6-4016fc NtCreateSection 244->246 247 40167c-40169d NtMapViewOfSection 244->247 246->233 250 401702-401706 246->250 247->246 249 40169f-4016bb NtMapViewOfSection 247->249 249->246 252 4016bd-4016d3 249->252 250->233 253 40170c-40172d NtMapViewOfSection 250->253 252->246 253->233 255 401733-40174f NtMapViewOfSection 253->255 255->233 258 401755 call 40175a 255->258
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 72661907227a9452eb25ab953c02bdcf5a827517e06e297a0d085dc110f4c5bf
                                                                                        • Instruction ID: 765dedf92b6036aea99e2596c7c6646b0bcbba97602321f23575c560d9e65fb8
                                                                                        • Opcode Fuzzy Hash: 72661907227a9452eb25ab953c02bdcf5a827517e06e297a0d085dc110f4c5bf
                                                                                        • Instruction Fuzzy Hash: 1451E8B5900249BFEF208F91CC48FDF7BB8FF85B10F104169FA11AA2A5D6749945CB64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 260 4015cb-4015e3 call 40120e 266 4015e5 260->266 267 4015e8-4015ed 260->267 266->267 269 401913-40191b 267->269 270 4015f3-401604 267->270 269->267 273 401920-401966 call 40120e 269->273 274 401911 270->274 275 40160a-401633 270->275 274->273 275->274 283 401639-401650 NtDuplicateObject 275->283 283->274 285 401656-40167a NtCreateSection 283->285 287 4016d6-4016fc NtCreateSection 285->287 288 40167c-40169d NtMapViewOfSection 285->288 287->274 291 401702-401706 287->291 288->287 290 40169f-4016bb NtMapViewOfSection 288->290 290->287 293 4016bd-4016d3 290->293 291->274 294 40170c-40172d NtMapViewOfSection 291->294 293->287 294->274 296 401733-40174f NtMapViewOfSection 294->296 296->274 299 401755 call 40175a 296->299
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B6
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F7
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401728
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040174A
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 004f83838c091370c792dd4fcb680897e20f1790ca1ffba750393c7614aa26f8
                                                                                        • Instruction ID: 60f1a669064b898f2f8cfe764b4cdaf5e199705ebcb5ef48edc51869d28594cd
                                                                                        • Opcode Fuzzy Hash: 004f83838c091370c792dd4fcb680897e20f1790ca1ffba750393c7614aa26f8
                                                                                        • Instruction Fuzzy Hash: 2C51FAB1900249BFEF208F91CC48F9FBBB8FF85B10F104169FA11AA2A5D7749941CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 0 9d003c-9d0047 1 9d004c-9d0263 call 9d0a3f call 9d0e0f call 9d0d90 VirtualAlloc 0->1 2 9d0049 0->2 17 9d028b-9d0292 1->17 18 9d0265-9d0289 call 9d0a69 1->18 2->1 20 9d02a1-9d02b0 17->20 22 9d02ce-9d03c2 VirtualProtect call 9d0cce call 9d0ce7 18->22 20->22 23 9d02b2-9d02cc 20->23 29 9d03d1-9d03e0 22->29 23->20 30 9d0439-9d04b8 VirtualFree 29->30 31 9d03e2-9d0437 call 9d0ce7 29->31 33 9d04be-9d04cd 30->33 34 9d05f4-9d05fe 30->34 31->29 36 9d04d3-9d04dd 33->36 37 9d077f-9d0789 34->37 38 9d0604-9d060d 34->38 36->34 41 9d04e3-9d0505 36->41 42 9d078b-9d07a3 37->42 43 9d07a6-9d07b0 37->43 38->37 39 9d0613-9d0637 38->39 44 9d063e-9d0648 39->44 54 9d0517-9d0520 41->54 55 9d0507-9d0515 41->55 42->43 45 9d086e-9d08be LoadLibraryA 43->45 46 9d07b6-9d07cb 43->46 44->37 48 9d064e-9d065a 44->48 53 9d08c7-9d08f9 45->53 47 9d07d2-9d07d5 46->47 50 9d0824-9d0833 47->50 51 9d07d7-9d07e0 47->51 48->37 52 9d0660-9d066a 48->52 60 9d0839-9d083c 50->60 57 9d07e4-9d0822 51->57 58 9d07e2 51->58 59 9d067a-9d0689 52->59 61 9d08fb-9d0901 53->61 62 9d0902-9d091d 53->62 56 9d0526-9d0547 54->56 55->56 63 9d054d-9d0550 56->63 57->47 58->50 64 9d068f-9d06b2 59->64 65 9d0750-9d077a 59->65 60->45 66 9d083e-9d0847 60->66 61->62 68 9d0556-9d056b 63->68 69 9d05e0-9d05ef 63->69 70 9d06ef-9d06fc 64->70 71 9d06b4-9d06ed 64->71 65->44 72 9d0849 66->72 73 9d084b-9d086c 66->73 74 9d056d 68->74 75 9d056f-9d057a 68->75 69->36 76 9d06fe-9d0748 70->76 77 9d074b 70->77 71->70 72->45 73->60 74->69 78 9d057c-9d0599 75->78 79 9d059b-9d05bb 75->79 76->77 77->59 84 9d05bd-9d05db 78->84 79->84 84->63
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 009D024D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515807475.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_9d0000_atjdeae.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID: cess$kernel32.dll
                                                                                        • API String ID: 4275171209-1230238691
                                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                        • Instruction ID: 5c36b97fbd7eb516f5c5aebb53495624ec53899763a9feb03dc5b99fe81f7268
                                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                        • Instruction Fuzzy Hash: B9526974A012299FDB64CF58C984BA8BBB1BF49304F1480DAE94DAB351DB30AE85DF14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 301 ad0145-ad015e 302 ad0160-ad0162 301->302 303 ad0169-ad0175 CreateToolhelp32Snapshot 302->303 304 ad0164 302->304 305 ad0185-ad0192 Module32First 303->305 306 ad0177-ad017d 303->306 304->303 307 ad019b-ad01a3 305->307 308 ad0194-ad0195 call acfe04 305->308 306->305 313 ad017f-ad0183 306->313 311 ad019a 308->311 311->307 313->302 313->305
                                                                                        APIs
                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00AD016D
                                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 00AD018D
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1516424096.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AC9000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_ac9000_atjdeae.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                        • String ID:
                                                                                        • API String ID: 3833638111-0
                                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction ID: de1d9967d200f1aea137a017a5b006f79b355be6bde2d8630369ed12d41b3a34
                                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction Fuzzy Hash: 64F062351007157FD7202BF5AD8DFAFB6ECAF49724F100629F657911C0DAB0ED454661
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 314 9d0e0f-9d0e24 SetErrorMode * 2 315 9d0e2b-9d0e2c 314->315 316 9d0e26 314->316 316->315
                                                                                        APIs
                                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,009D0223,?,?), ref: 009D0E19
                                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,009D0223,?,?), ref: 009D0E1E
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515807475.00000000009D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_9d0000_atjdeae.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorMode
                                                                                        • String ID:
                                                                                        • API String ID: 2340568224-0
                                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                        • Instruction ID: 73589451eedafcd612fbb6da3bed014ce118f5ec752f8284b0a0a767950f6234
                                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                        • Instruction Fuzzy Hash: 83D0123114512877D7002A94DC09BCD7B1CDF05B62F008411FB0DD9180C770994046E5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 317 4029ba-4029c3 318 4029d3 317->318 319 4029ca-4029cf 317->319 318->319 320 4029d6-402a0b call 40120e 318->320 319->320 329 402a0f-402a1d LdrLoadDll 320->329 330 402a26-402a71 call 40120e 329->330 331 402a1f 329->331 331->330
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 8b4368bb53e1649655da800b8e3771367f61da053ffbe47dde7c34dc5595736a
                                                                                        • Instruction ID: ddfd821467dba8d9e3be05996510f596060048204c77d2b9bdf6330f9e046059
                                                                                        • Opcode Fuzzy Hash: 8b4368bb53e1649655da800b8e3771367f61da053ffbe47dde7c34dc5595736a
                                                                                        • Instruction Fuzzy Hash: 5C11E571708104E7D6209A449B4EF6B3724AB50B00F308077E5077A1C0D9FD9A07BBAF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 343 4029c5-402a0b call 40120e 354 402a0f-402a1d LdrLoadDll 343->354 355 402a26-402a71 call 40120e 354->355 356 402a1f 354->356 356->355
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 630f67e63f4c9d6cadc1f4ef28869250e9dd95ac73f78134dda1cef590dfe083
                                                                                        • Instruction ID: eda82e36109819710fc28ef01b941f30aa1b457bd77d6c907d6690057fca41fa
                                                                                        • Opcode Fuzzy Hash: 630f67e63f4c9d6cadc1f4ef28869250e9dd95ac73f78134dda1cef590dfe083
                                                                                        • Instruction Fuzzy Hash: 3C01C471708205E7DA60DA949A4EB6B7710AB51B10F308077E5037A1C4DAFD9A07FB6B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 368 4029d1-4029d3 370 4029d6-402a0b call 40120e 368->370 371 4029ca-4029cf 368->371 380 402a0f-402a1d LdrLoadDll 370->380 371->370 381 402a26-402a71 call 40120e 380->381 382 402a1f 380->382 382->381
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 8aebd7c2dfb35844096bdf04bcf18f9291abc38b44631a4f8f553a04b448b611
                                                                                        • Instruction ID: 27f311fed6bd4bb195386d6e886048742e5b6b48a655c0a394e70793ed6bf28f
                                                                                        • Opcode Fuzzy Hash: 8aebd7c2dfb35844096bdf04bcf18f9291abc38b44631a4f8f553a04b448b611
                                                                                        • Instruction Fuzzy Hash: E0018071708105E7DA609A449B4EB6B7324BB50B10F308477E5077A1C4DAFD9A07BB6F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 394 4029d5-402a0b call 40120e 402 402a0f-402a1d LdrLoadDll 394->402 403 402a26-402a71 call 40120e 402->403 404 402a1f 402->404 404->403
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 14f9d75437b26c4e33ab762a249f6d4a6897a4cf10a17b4738070ea496484bd2
                                                                                        • Instruction ID: 6c082c2f6db60d75b034223dafbed04b71575a1e0537fab93527f59567f6cb96
                                                                                        • Opcode Fuzzy Hash: 14f9d75437b26c4e33ab762a249f6d4a6897a4cf10a17b4738070ea496484bd2
                                                                                        • Instruction Fuzzy Hash: DB01B531708105E7DB60DA409A4DF5F7720BB50B10F208577E5077A1C4DAF99A17EB9B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 416 4029e2-402a0b call 40120e 423 402a0f-402a1d LdrLoadDll 416->423 424 402a26-402a71 call 40120e 423->424 425 402a1f 423->425 425->424
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: b2d371f82e3e545a267ab12f2e2f0a58ec4b54f775fd64736b106f9591d7a7c3
                                                                                        • Instruction ID: daf8977218c418413866257df5c9087131837fd98e0c4230724de407841e0162
                                                                                        • Opcode Fuzzy Hash: b2d371f82e3e545a267ab12f2e2f0a58ec4b54f775fd64736b106f9591d7a7c3
                                                                                        • Instruction Fuzzy Hash: 3801DF31708104E7DB209A848A4DB5E7320AB40B10F208577E507BA1C0DAF9AA07AFAB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 437 4029e9-402a0b call 40120e 442 402a0f-402a1d LdrLoadDll 437->442 443 402a26-402a71 call 40120e 442->443 444 402a1f 442->444 444->443
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 9850a57f899f03cbeedeed8d531e786c982b6ed5f0a372be87f463e87495e5bd
                                                                                        • Instruction ID: 5524fd7572365f35614fa46947343296b9db081daee3b4d0816b59f029c0b045
                                                                                        • Opcode Fuzzy Hash: 9850a57f899f03cbeedeed8d531e786c982b6ed5f0a372be87f463e87495e5bd
                                                                                        • Instruction Fuzzy Hash: 2101A731704104E7D7209A448A4EB5E7720AB40704F208477E5067A1C4DAB9EA07AB6B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 456 4029f9-402a1d call 40120e LdrLoadDll 463 402a26-402a71 call 40120e 456->463 464 402a1f 456->464 464->463
                                                                                        APIs
                                                                                        • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 00402A18
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Load
                                                                                        • String ID:
                                                                                        • API String ID: 2234796835-0
                                                                                        • Opcode ID: 83fdb88ab79b739a001a2e8c05ea2e4136fbf27434a3016a2f3de2c8c28590ed
                                                                                        • Instruction ID: 2a527b723104a8d4642483acce18f9de5ed6d5a74c4e47f32731208c7d716ef4
                                                                                        • Opcode Fuzzy Hash: 83fdb88ab79b739a001a2e8c05ea2e4136fbf27434a3016a2f3de2c8c28590ed
                                                                                        • Instruction Fuzzy Hash: 1801A231708104E7DB209A849A4DF9F7720AB40B14F208477E5027A1C0DAF9AA07AFAB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: b8285f967374eae4a3c51efe3ce59b098afe428af0dcb557450618fb68c9c18d
                                                                                        • Instruction ID: 1276e484f00ba66cbffb4616bb4d5d076efec51046982770477825c9afbd6400
                                                                                        • Opcode Fuzzy Hash: b8285f967374eae4a3c51efe3ce59b098afe428af0dcb557450618fb68c9c18d
                                                                                        • Instruction Fuzzy Hash: 0F01D2B6708205FADB005A949C62EBB3618AB41755F300637BA13B80F1C57D8513FA6F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: 9a4c6db62cce5b151e284cc19e63a433146ff3755d8681b35f1a2b6972971a8e
                                                                                        • Instruction ID: 0230620869f43b82b90ed4dddf49477c9f5c6c73dade890abd4ec4b7d4a8195a
                                                                                        • Opcode Fuzzy Hash: 9a4c6db62cce5b151e284cc19e63a433146ff3755d8681b35f1a2b6972971a8e
                                                                                        • Instruction Fuzzy Hash: 4801BCB6308205FADB005A949C62FBA3219AB84751F30053BB613BC0F1C53D8513FA2F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: 25088a1f844088f741a859eeb607afc94706ffd20a91742bc3d9f24c23efa0b5
                                                                                        • Instruction ID: 9a4b4ffd5ca22a672d673467c452b15ea5c40039b4ea8ded510267d200494456
                                                                                        • Opcode Fuzzy Hash: 25088a1f844088f741a859eeb607afc94706ffd20a91742bc3d9f24c23efa0b5
                                                                                        • Instruction Fuzzy Hash: 3A01B1B6308205FADB115A949C61A7A3319AB45711F30053BB613B80F2C53D8512FA1F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: f146987f8c0bf49c3ef7592727f3e0a51ae856d021a330616d03f7304a9c3b71
                                                                                        • Instruction ID: 5a2bb716a64f0a1f1a6e426f0b200f3e6862a670896c4db1e76ea4af0659c5ba
                                                                                        • Opcode Fuzzy Hash: f146987f8c0bf49c3ef7592727f3e0a51ae856d021a330616d03f7304a9c3b71
                                                                                        • Instruction Fuzzy Hash: 3101DFB2308205FADB005AD49C62F7A3219AB85715F30453BB623B80F1C63D8512FB2F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00ACFE55
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1516424096.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AC9000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_ac9000_atjdeae.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction ID: 1645de1997d19abcb525161178c12286c6cb5b92b9a3f27a2d1d208dab31f185
                                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction Fuzzy Hash: 61113C79A00208EFDB01DF98CA85E99BFF5AF08350F1580A4F9489B362D371EA50DF90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: a8f77c5b0aafc3a83b6e9a89fc0125d54fce9978fbcf9d902b8238b221feffd7
                                                                                        • Instruction ID: 689da8ed0bf63c85a60a16fbbe407e4b0918199af58fa2149c0a58fdfe32668e
                                                                                        • Opcode Fuzzy Hash: a8f77c5b0aafc3a83b6e9a89fc0125d54fce9978fbcf9d902b8238b221feffd7
                                                                                        • Instruction Fuzzy Hash: 0E0181B6308105FADB115AD49D52FBA3719AB45751F30453BB613B80F2C53D8512FB2B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388), ref: 004019B4
                                                                                          • Part of subcall function 00401590: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401648
                                                                                          • Part of subcall function 00401590: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401675
                                                                                          • Part of subcall function 00401590: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401698
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000D.00000002.1515534615.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_13_2_400000_atjdeae.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$CreateDuplicateObjectSleepView
                                                                                        • String ID:
                                                                                        • API String ID: 1885482327-0
                                                                                        • Opcode ID: 994369af4d0fa0c447a21c659804c9e18bb6abd6db9e85dcf8f049b878b9c4ba
                                                                                        • Instruction ID: 9477092311c163758adf26378a137d016a4cc75b4861da4fd192d9fcf75081b0
                                                                                        • Opcode Fuzzy Hash: 994369af4d0fa0c447a21c659804c9e18bb6abd6db9e85dcf8f049b878b9c4ba
                                                                                        • Instruction Fuzzy Hash: 25016D72304105FADB119AD09C52EAA3729AB48355F30457BB613BD0F2C63D8552EB2B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Execution Graph

                                                                                        Execution Coverage:43%
                                                                                        Dynamic/Decrypted Code Coverage:86.4%
                                                                                        Signature Coverage:34.1%
                                                                                        Total number of Nodes:44
                                                                                        Total number of Limit Nodes:8
                                                                                        execution_graph 471 405995 474 409a91 471->474 473 40599a 473->473 475 409ac3 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 474->475 476 409ab6 474->476 477 409aba 475->477 476->475 476->477 477->473 422 5360000 425 5360630 422->425 424 5360005 426 536064c 425->426 428 5361577 426->428 431 53605b0 428->431 434 53605dc 431->434 432 53605e2 GetFileAttributesA 432->434 433 536061e 434->432 434->433 436 5360420 434->436 437 53604f3 436->437 438 53604ff CreateWindowExA 437->438 439 53604fa 437->439 438->439 440 5360540 PostMessageA 438->440 439->434 441 536055f 440->441 441->439 443 5360110 VirtualAlloc GetModuleFileNameA 441->443 444 5360414 443->444 445 536017d CreateProcessA 443->445 444->441 445->444 447 536025f VirtualFree VirtualAlloc Wow64GetThreadContext 445->447 447->444 448 53602a9 ReadProcessMemory 447->448 449 53602e5 VirtualAllocEx NtWriteVirtualMemory 448->449 450 53602d5 NtUnmapViewOfSection 448->450 453 536033b 449->453 450->449 451 5360350 NtWriteVirtualMemory 451->453 452 536039d WriteProcessMemory Wow64SetThreadContext ResumeThread 454 53603fb ExitProcess 452->454 453->451 453->452 456 51a4026 457 51a4035 456->457 460 51a47c6 457->460 461 51a47e1 460->461 462 51a47ea CreateToolhelp32Snapshot 461->462 463 51a4806 Module32First 461->463 462->461 462->463 464 51a403e 463->464 465 51a4815 463->465 467 51a4485 465->467 468 51a44b0 467->468 469 51a44f9 468->469 470 51a44c1 VirtualAlloc 468->470 469->469 470->469

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 05360156
                                                                                        • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 0536016C
                                                                                        • CreateProcessA.KERNELBASE(?,00000000), ref: 05360255
                                                                                        • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 05360270
                                                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 05360283
                                                                                        • Wow64GetThreadContext.KERNEL32(00000000,?), ref: 0536029F
                                                                                        • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 053602C8
                                                                                        • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 053602E3
                                                                                        • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 05360304
                                                                                        • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 0536032A
                                                                                        • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 05360399
                                                                                        • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 053603BF
                                                                                        • Wow64SetThreadContext.KERNEL32(00000000,?), ref: 053603E1
                                                                                        • ResumeThread.KERNELBASE(00000000), ref: 053603ED
                                                                                        • ExitProcess.KERNEL32(00000000), ref: 05360412
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000E.00000002.1562903782.0000000005360000.00000040.00001000.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_14_2_5360000_CAC0.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$MemoryProcess$AllocThreadWrite$ContextWow64$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                                                                                        • String ID:
                                                                                        • API String ID: 93872480-0
                                                                                        • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                                                                        • Instruction ID: c3f65b7cb7bd2b3b3f72b83ea385b47f98cf32d12f590489b064e8b564a7ef85
                                                                                        • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                                                                        • Instruction Fuzzy Hash: 2DB1C874A00208AFDB44CF98C895FAEBBB5FF88314F248158E549AB395D771AE41CF94
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 15 5360420-53604f8 17 53604ff-536053c CreateWindowExA 15->17 18 53604fa 15->18 20 5360540-5360558 PostMessageA 17->20 21 536053e 17->21 19 53605aa-53605ad 18->19 22 536055f-5360563 20->22 21->19 22->19 23 5360565-5360579 22->23 23->19 25 536057b-5360582 23->25 26 5360584-5360588 25->26 27 53605a8 25->27 26->27 28 536058a-5360591 26->28 27->22 28->27 29 5360593-5360597 call 5360110 28->29 31 536059c-53605a5 29->31 31->27
                                                                                        APIs
                                                                                        • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 05360533
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000E.00000002.1562903782.0000000005360000.00000040.00001000.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_14_2_5360000_CAC0.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                                                                                        • API String ID: 716092398-2341455598
                                                                                        • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                                                                        • Instruction ID: e7f7595d94f90a8475ef5b38efbf2091ab0e9a2ddfacdb2d6da4e710a164bf96
                                                                                        • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                                                                        • Instruction Fuzzy Hash: 73510870D08388DAEB15CB98C849BEDBFB66F11708F14405CD5447F28AC3FA5658CB66
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 32 53605b0-53605d5 33 53605dc-53605e0 32->33 34 53605e2-53605f5 GetFileAttributesA 33->34 35 536061e-5360621 33->35 36 53605f7-53605fe 34->36 37 5360613-536061c 34->37 36->37 38 5360600-536060b call 5360420 36->38 37->33 40 5360610 38->40 40->37
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNELBASE(apfHQ), ref: 053605EC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000E.00000002.1562903782.0000000005360000.00000040.00001000.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_14_2_5360000_CAC0.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID: apfHQ$o
                                                                                        • API String ID: 3188754299-2999369273
                                                                                        • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                                                                        • Instruction ID: 1bc503e342ce070d65f08d24a0803af9c46a379d60f4634d8e8de87756de364e
                                                                                        • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                                                                        • Instruction Fuzzy Hash: 34012170C0824CEEDF15DB98C5193AEBFB5AF41308F1480DDC4592B241D7B69B58CBA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 41 51a47c6-51a47df 42 51a47e1-51a47e3 41->42 43 51a47ea-51a47f6 CreateToolhelp32Snapshot 42->43 44 51a47e5 42->44 45 51a47f8-51a47fe 43->45 46 51a4806-51a4813 Module32First 43->46 44->43 45->46 51 51a4800-51a4804 45->51 47 51a481c-51a4824 46->47 48 51a4815-51a4816 call 51a4485 46->48 52 51a481b 48->52 51->42 51->46 52->47
                                                                                        APIs
                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 051A47EE
                                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 051A480E
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000E.00000002.1562660242.00000000051A4000.00000040.00000020.00020000.00000000.sdmp, Offset: 051A4000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_14_2_51a4000_CAC0.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                        • String ID:
                                                                                        • API String ID: 3833638111-0
                                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction ID: abe23512d9367597305555870bdf4b32fee957d604f8eb0843e5a10ce31582ac
                                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction Fuzzy Hash: FAF0623A2007106BDB227BF9A88DA6A76E8BF89625F100629E643914C0DBF0E8458661
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 54 51a4485-51a44bf call 51a4798 57 51a450d 54->57 58 51a44c1-51a44f4 VirtualAlloc call 51a4512 54->58 57->57 60 51a44f9-51a450b 58->60 60->57
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 051A44D6
                                                                                        Memory Dump Source
                                                                                        • Source File: 0000000E.00000002.1562660242.00000000051A4000.00000040.00000020.00020000.00000000.sdmp, Offset: 051A4000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_14_2_51a4000_CAC0.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction ID: 2f05df9b1e66e4337e98984e078c18ab40765b9d1edfc24fbf1b725363a7c5de
                                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction Fuzzy Hash: 68113C79A00208EFDB01DF98C985E99BBF5AF08350F058094F9489B362D371EA90DF80
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Execution Graph

                                                                                        Execution Coverage:10.8%
                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                        Signature Coverage:16.4%
                                                                                        Total number of Nodes:2000
                                                                                        Total number of Limit Nodes:36
                                                                                        execution_graph 14690 7ff7285c8584 14691 7ff7285c8594 14690->14691 14695 7ff7285c859d 14690->14695 14691->14695 14696 7ff7285c8094 14691->14696 14697 7ff7285c80ad 14696->14697 14708 7ff7285c80a9 14696->14708 14717 7ff7285d1bac GetEnvironmentStringsW 14697->14717 14700 7ff7285c80c6 14724 7ff7285c8214 14700->14724 14701 7ff7285c80ba 14743 7ff7285c9e48 14701->14743 14705 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14706 7ff7285c80ed 14705->14706 14707 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14706->14707 14707->14708 14708->14695 14709 7ff7285c8454 14708->14709 14714 7ff7285c8477 14709->14714 14715 7ff7285c848e 14709->14715 14710 7ff7285ce820 MultiByteToWideChar _fread_nolock 14710->14715 14711 7ff7285cdd70 _findclose 11 API calls 14711->14715 14712 7ff7285c8502 14713 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14712->14713 14713->14714 14714->14695 14715->14710 14715->14711 14715->14712 14715->14714 14716 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14715->14716 14716->14715 14718 7ff7285c80b2 14717->14718 14720 7ff7285d1bd0 14717->14720 14718->14700 14718->14701 14749 7ff7285ccafc 14720->14749 14721 7ff7285d1c07 memcpy_s 14722 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14721->14722 14723 7ff7285d1c27 FreeEnvironmentStringsW 14722->14723 14723->14718 14725 7ff7285c823c 14724->14725 14726 7ff7285cdd70 _findclose 11 API calls 14725->14726 14737 7ff7285c8277 14726->14737 14727 7ff7285c827f 14728 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14727->14728 14729 7ff7285c80ce 14728->14729 14729->14705 14730 7ff7285c82f9 14731 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14730->14731 14731->14729 14732 7ff7285cdd70 _findclose 11 API calls 14732->14737 14733 7ff7285c82e8 14820 7ff7285c8330 14733->14820 14737->14727 14737->14730 14737->14732 14737->14733 14738 7ff7285c831c 14737->14738 14741 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14737->14741 14811 7ff7285cf954 14737->14811 14826 7ff7285c9e00 IsProcessorFeaturePresent 14738->14826 14739 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14739->14727 14741->14737 14744 7ff7285c9e7c 14743->14744 14745 7ff7285c9e4d RtlRestoreThreadPreferredUILanguages 14743->14745 14744->14708 14745->14744 14746 7ff7285c9e68 GetLastError 14745->14746 14747 7ff7285c9e75 Concurrency::details::SchedulerProxy::DeleteThis 14746->14747 14748 7ff7285c4474 _findclose 9 API calls 14747->14748 14748->14744 14750 7ff7285ccb47 14749->14750 14755 7ff7285ccb0b _findclose 14749->14755 14759 7ff7285c4474 14750->14759 14752 7ff7285ccb2e RtlAllocateHeap 14753 7ff7285ccb45 14752->14753 14752->14755 14753->14721 14755->14750 14755->14752 14756 7ff7285d26e0 14755->14756 14762 7ff7285d2720 14756->14762 14768 7ff7285ca7c8 GetLastError 14759->14768 14761 7ff7285c447d 14761->14753 14767 7ff7285cf7b8 EnterCriticalSection 14762->14767 14769 7ff7285ca809 FlsSetValue 14768->14769 14774 7ff7285ca7ec 14768->14774 14770 7ff7285ca7f9 SetLastError 14769->14770 14771 7ff7285ca81b 14769->14771 14770->14761 14785 7ff7285cdd70 14771->14785 14774->14769 14774->14770 14776 7ff7285ca848 FlsSetValue 14779 7ff7285ca854 FlsSetValue 14776->14779 14780 7ff7285ca866 14776->14780 14777 7ff7285ca838 FlsSetValue 14778 7ff7285ca841 14777->14778 14781 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 14778->14781 14779->14778 14792 7ff7285ca3f4 14780->14792 14781->14770 14790 7ff7285cdd81 _findclose 14785->14790 14786 7ff7285cddd2 14788 7ff7285c4474 _findclose 10 API calls 14786->14788 14787 7ff7285cddb6 RtlAllocateHeap 14789 7ff7285ca82a 14787->14789 14787->14790 14788->14789 14789->14776 14789->14777 14790->14786 14790->14787 14791 7ff7285d26e0 _findclose 2 API calls 14790->14791 14791->14790 14797 7ff7285ca2cc 14792->14797 14809 7ff7285cf7b8 EnterCriticalSection 14797->14809 14812 7ff7285cf961 14811->14812 14813 7ff7285cf96b 14811->14813 14812->14813 14817 7ff7285cf987 14812->14817 14814 7ff7285c4474 _findclose 11 API calls 14813->14814 14819 7ff7285cf973 14814->14819 14816 7ff7285cf97f 14816->14737 14817->14816 14818 7ff7285c4474 _findclose 11 API calls 14817->14818 14818->14819 14830 7ff7285c9de0 14819->14830 14821 7ff7285c8335 14820->14821 14822 7ff7285c82f0 14820->14822 14823 7ff7285c835e 14821->14823 14824 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14821->14824 14822->14739 14825 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14823->14825 14824->14821 14825->14822 14827 7ff7285c9e13 14826->14827 14870 7ff7285c9b14 14827->14870 14832 7ff7285c9c78 14830->14832 14833 7ff7285c9ca3 14832->14833 14836 7ff7285c9d14 14833->14836 14835 7ff7285c9cca 14844 7ff7285c9a5c 14836->14844 14839 7ff7285c9d4f 14839->14835 14842 7ff7285c9e00 _wfindfirst32i64 17 API calls 14843 7ff7285c9ddf 14842->14843 14845 7ff7285c9ab3 14844->14845 14846 7ff7285c9a78 GetLastError 14844->14846 14845->14839 14850 7ff7285c9ac8 14845->14850 14847 7ff7285c9a88 14846->14847 14853 7ff7285ca890 14847->14853 14851 7ff7285c9ae4 GetLastError SetLastError 14850->14851 14852 7ff7285c9afc 14850->14852 14851->14852 14852->14839 14852->14842 14854 7ff7285ca8af FlsGetValue 14853->14854 14855 7ff7285ca8ca FlsSetValue 14853->14855 14857 7ff7285ca8c4 14854->14857 14859 7ff7285c9aa3 SetLastError 14854->14859 14856 7ff7285ca8d7 14855->14856 14855->14859 14858 7ff7285cdd70 _findclose 11 API calls 14856->14858 14857->14855 14860 7ff7285ca8e6 14858->14860 14859->14845 14861 7ff7285ca904 FlsSetValue 14860->14861 14862 7ff7285ca8f4 FlsSetValue 14860->14862 14864 7ff7285ca910 FlsSetValue 14861->14864 14865 7ff7285ca922 14861->14865 14863 7ff7285ca8fd 14862->14863 14866 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14863->14866 14864->14863 14867 7ff7285ca3f4 _findclose 11 API calls 14865->14867 14866->14859 14868 7ff7285ca92a 14867->14868 14869 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 14868->14869 14869->14859 14871 7ff7285c9b4e _wfindfirst32i64 memcpy_s 14870->14871 14872 7ff7285c9b76 RtlCaptureContext RtlLookupFunctionEntry 14871->14872 14873 7ff7285c9be6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14872->14873 14874 7ff7285c9bb0 RtlVirtualUnwind 14872->14874 14875 7ff7285c9c38 _wfindfirst32i64 14873->14875 14874->14873 14878 7ff7285badb0 14875->14878 14879 7ff7285badb9 14878->14879 14880 7ff7285badc4 GetCurrentProcess TerminateProcess 14879->14880 14881 7ff7285bae70 IsProcessorFeaturePresent 14879->14881 14882 7ff7285bae88 14881->14882 14887 7ff7285bb064 RtlCaptureContext 14882->14887 14888 7ff7285bb07e RtlLookupFunctionEntry 14887->14888 14889 7ff7285bb094 RtlVirtualUnwind 14888->14889 14890 7ff7285bae9b 14888->14890 14889->14888 14889->14890 14891 7ff7285bae30 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14890->14891 17889 7ff7285c8a80 17892 7ff7285c8a00 17889->17892 17899 7ff7285cf7b8 EnterCriticalSection 17892->17899 17903 7ff7285d9694 17906 7ff7285c4328 LeaveCriticalSection 17903->17906 14901 7ff7285ce90c 14902 7ff7285ceafe 14901->14902 14904 7ff7285ce94e _isindst 14901->14904 14903 7ff7285c4474 _findclose 11 API calls 14902->14903 14921 7ff7285ceaee 14903->14921 14904->14902 14907 7ff7285ce9ce _isindst 14904->14907 14905 7ff7285badb0 _wfindfirst32i64 8 API calls 14906 7ff7285ceb19 14905->14906 14922 7ff7285d53e4 14907->14922 14912 7ff7285ceb2a 14914 7ff7285c9e00 _wfindfirst32i64 17 API calls 14912->14914 14916 7ff7285ceb3e 14914->14916 14919 7ff7285cea2b 14919->14921 14947 7ff7285d5428 14919->14947 14921->14905 14923 7ff7285d53f3 14922->14923 14924 7ff7285ce9ec 14922->14924 14954 7ff7285cf7b8 EnterCriticalSection 14923->14954 14929 7ff7285d47e8 14924->14929 14930 7ff7285d47f1 14929->14930 14931 7ff7285cea01 14929->14931 14932 7ff7285c4474 _findclose 11 API calls 14930->14932 14931->14912 14935 7ff7285d4818 14931->14935 14933 7ff7285d47f6 14932->14933 14934 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 14933->14934 14934->14931 14936 7ff7285d4821 14935->14936 14938 7ff7285cea12 14935->14938 14937 7ff7285c4474 _findclose 11 API calls 14936->14937 14939 7ff7285d4826 14937->14939 14938->14912 14941 7ff7285d4848 14938->14941 14940 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 14939->14940 14940->14938 14942 7ff7285d4851 14941->14942 14944 7ff7285cea23 14941->14944 14943 7ff7285c4474 _findclose 11 API calls 14942->14943 14945 7ff7285d4856 14943->14945 14944->14912 14944->14919 14946 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 14945->14946 14946->14944 14955 7ff7285cf7b8 EnterCriticalSection 14947->14955 19020 7ff7285d950e 19021 7ff7285d951e 19020->19021 19024 7ff7285c4328 LeaveCriticalSection 19021->19024 19143 7ff7285c42c0 19144 7ff7285c42cb 19143->19144 19152 7ff7285ce384 19144->19152 19165 7ff7285cf7b8 EnterCriticalSection 19152->19165 18370 7ff7285cfa38 18371 7ff7285cfa5c 18370->18371 18373 7ff7285cfa6c 18370->18373 18372 7ff7285c4474 _findclose 11 API calls 18371->18372 18392 7ff7285cfa61 18372->18392 18374 7ff7285cfd4c 18373->18374 18375 7ff7285cfa8e 18373->18375 18376 7ff7285c4474 _findclose 11 API calls 18374->18376 18377 7ff7285cfaaf 18375->18377 18501 7ff7285d00f4 18375->18501 18378 7ff7285cfd51 18376->18378 18381 7ff7285cfb21 18377->18381 18383 7ff7285cfad5 18377->18383 18388 7ff7285cfb15 18377->18388 18380 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18378->18380 18380->18392 18385 7ff7285cdd70 _findclose 11 API calls 18381->18385 18402 7ff7285cfae4 18381->18402 18382 7ff7285cfbce 18391 7ff7285cfbeb 18382->18391 18399 7ff7285cfc3d 18382->18399 18516 7ff7285c8548 18383->18516 18389 7ff7285cfb37 18385->18389 18387 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18387->18392 18388->18382 18388->18402 18522 7ff7285d64dc 18388->18522 18393 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18389->18393 18396 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18391->18396 18397 7ff7285cfb45 18393->18397 18394 7ff7285cfadf 18398 7ff7285c4474 _findclose 11 API calls 18394->18398 18395 7ff7285cfafd 18395->18388 18401 7ff7285d00f4 45 API calls 18395->18401 18400 7ff7285cfbf4 18396->18400 18397->18388 18397->18402 18405 7ff7285cdd70 _findclose 11 API calls 18397->18405 18398->18402 18399->18402 18403 7ff7285d252c 40 API calls 18399->18403 18412 7ff7285cfbf9 18400->18412 18558 7ff7285d252c 18400->18558 18401->18388 18402->18387 18404 7ff7285cfc7a 18403->18404 18407 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18404->18407 18406 7ff7285cfb67 18405->18406 18409 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18406->18409 18410 7ff7285cfc84 18407->18410 18409->18388 18410->18402 18410->18412 18411 7ff7285cfd40 18414 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18411->18414 18412->18411 18416 7ff7285cdd70 _findclose 11 API calls 18412->18416 18413 7ff7285cfc25 18415 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18413->18415 18414->18392 18415->18412 18417 7ff7285cfcc8 18416->18417 18418 7ff7285cfcd0 18417->18418 18419 7ff7285cfcd9 18417->18419 18421 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18418->18421 18420 7ff7285c91dc __std_exception_copy 37 API calls 18419->18420 18423 7ff7285cfce8 18420->18423 18422 7ff7285cfcd7 18421->18422 18428 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18422->18428 18424 7ff7285cfcf0 18423->18424 18425 7ff7285cfd7b 18423->18425 18567 7ff7285d65f4 18424->18567 18427 7ff7285c9e00 _wfindfirst32i64 17 API calls 18425->18427 18430 7ff7285cfd8f 18427->18430 18428->18392 18433 7ff7285cfdb8 18430->18433 18439 7ff7285cfdc8 18430->18439 18431 7ff7285cfd17 18435 7ff7285c4474 _findclose 11 API calls 18431->18435 18432 7ff7285cfd38 18434 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18432->18434 18436 7ff7285c4474 _findclose 11 API calls 18433->18436 18434->18411 18437 7ff7285cfd1c 18435->18437 18438 7ff7285cfdbd 18436->18438 18441 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18437->18441 18440 7ff7285d00ab 18439->18440 18442 7ff7285cfdea 18439->18442 18443 7ff7285c4474 _findclose 11 API calls 18440->18443 18441->18422 18448 7ff7285cfe07 18442->18448 18586 7ff7285d01dc 18442->18586 18444 7ff7285d00b0 18443->18444 18446 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18444->18446 18446->18438 18447 7ff7285cfe7b 18452 7ff7285cfea3 18447->18452 18456 7ff7285cdd70 _findclose 11 API calls 18447->18456 18468 7ff7285cfe3e 18447->18468 18448->18447 18450 7ff7285cfe2f 18448->18450 18460 7ff7285cfe6f 18448->18460 18449 7ff7285cff2e 18458 7ff7285cff4b 18449->18458 18469 7ff7285cff9e 18449->18469 18601 7ff7285c8584 18450->18601 18454 7ff7285cdd70 _findclose 11 API calls 18452->18454 18452->18460 18452->18468 18459 7ff7285cfec5 18454->18459 18455 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18455->18438 18461 7ff7285cfe95 18456->18461 18464 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18458->18464 18465 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18459->18465 18460->18449 18460->18468 18607 7ff7285d639c 18460->18607 18466 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18461->18466 18462 7ff7285cfe57 18462->18460 18471 7ff7285d01dc 45 API calls 18462->18471 18463 7ff7285cfe39 18467 7ff7285c4474 _findclose 11 API calls 18463->18467 18470 7ff7285cff54 18464->18470 18465->18460 18466->18452 18467->18468 18468->18455 18469->18468 18472 7ff7285d252c 40 API calls 18469->18472 18475 7ff7285d252c 40 API calls 18470->18475 18478 7ff7285cff5a 18470->18478 18471->18460 18473 7ff7285cffdc 18472->18473 18474 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18473->18474 18476 7ff7285cffe6 18474->18476 18479 7ff7285cff86 18475->18479 18476->18468 18476->18478 18477 7ff7285d009f 18480 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18477->18480 18478->18477 18482 7ff7285cdd70 _findclose 11 API calls 18478->18482 18481 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18479->18481 18480->18438 18481->18478 18483 7ff7285d002b 18482->18483 18484 7ff7285d0033 18483->18484 18485 7ff7285d003c 18483->18485 18486 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18484->18486 18487 7ff7285cf954 _wfindfirst32i64 37 API calls 18485->18487 18488 7ff7285d003a 18486->18488 18489 7ff7285d004a 18487->18489 18495 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18488->18495 18490 7ff7285d00df 18489->18490 18491 7ff7285d0052 SetEnvironmentVariableW 18489->18491 18494 7ff7285c9e00 _wfindfirst32i64 17 API calls 18490->18494 18492 7ff7285d0076 18491->18492 18493 7ff7285d0097 18491->18493 18497 7ff7285c4474 _findclose 11 API calls 18492->18497 18496 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18493->18496 18498 7ff7285d00f3 18494->18498 18495->18438 18496->18477 18499 7ff7285d007b 18497->18499 18500 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18499->18500 18500->18488 18502 7ff7285d0111 18501->18502 18503 7ff7285d0129 18501->18503 18502->18377 18504 7ff7285cdd70 _findclose 11 API calls 18503->18504 18510 7ff7285d014d 18504->18510 18505 7ff7285c923c __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18507 7ff7285d01d8 18505->18507 18506 7ff7285d01ae 18508 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18506->18508 18508->18502 18509 7ff7285cdd70 _findclose 11 API calls 18509->18510 18510->18506 18510->18509 18511 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18510->18511 18512 7ff7285c91dc __std_exception_copy 37 API calls 18510->18512 18513 7ff7285d01bd 18510->18513 18515 7ff7285d01d2 18510->18515 18511->18510 18512->18510 18514 7ff7285c9e00 _wfindfirst32i64 17 API calls 18513->18514 18514->18515 18515->18505 18517 7ff7285c8561 18516->18517 18518 7ff7285c8558 18516->18518 18517->18394 18517->18395 18518->18517 18631 7ff7285c8020 18518->18631 18523 7ff7285d568c 18522->18523 18524 7ff7285d64e9 18522->18524 18525 7ff7285d5699 18523->18525 18532 7ff7285d56cf 18523->18532 18526 7ff7285c4a4c 45 API calls 18524->18526 18529 7ff7285c4474 _findclose 11 API calls 18525->18529 18545 7ff7285d5640 18525->18545 18528 7ff7285d651d 18526->18528 18527 7ff7285d56f9 18531 7ff7285c4474 _findclose 11 API calls 18527->18531 18533 7ff7285d6522 18528->18533 18537 7ff7285d6533 18528->18537 18541 7ff7285d654a 18528->18541 18530 7ff7285d56a3 18529->18530 18534 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 18530->18534 18535 7ff7285d56fe 18531->18535 18532->18527 18536 7ff7285d571e 18532->18536 18533->18388 18539 7ff7285d56ae 18534->18539 18540 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 18535->18540 18546 7ff7285c4a4c 45 API calls 18536->18546 18551 7ff7285d5709 18536->18551 18538 7ff7285c4474 _findclose 11 API calls 18537->18538 18542 7ff7285d6538 18538->18542 18539->18388 18540->18551 18543 7ff7285d6554 18541->18543 18544 7ff7285d6566 18541->18544 18547 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 18542->18547 18548 7ff7285c4474 _findclose 11 API calls 18543->18548 18549 7ff7285d658e 18544->18549 18550 7ff7285d6577 18544->18550 18545->18388 18546->18551 18547->18533 18552 7ff7285d6559 18548->18552 18872 7ff7285d83b8 18549->18872 18863 7ff7285d56dc 18550->18863 18551->18388 18556 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 18552->18556 18556->18533 18557 7ff7285c4474 _findclose 11 API calls 18557->18533 18559 7ff7285d256b 18558->18559 18560 7ff7285d254e 18558->18560 18564 7ff7285d2575 18559->18564 18912 7ff7285d6fe8 18559->18912 18560->18559 18561 7ff7285d255c 18560->18561 18562 7ff7285c4474 _findclose 11 API calls 18561->18562 18566 7ff7285d2561 memcpy_s 18562->18566 18919 7ff7285cf9bc 18564->18919 18566->18413 18568 7ff7285c4a4c 45 API calls 18567->18568 18569 7ff7285d665a 18568->18569 18570 7ff7285cdffc 5 API calls 18569->18570 18571 7ff7285d6668 18569->18571 18570->18571 18572 7ff7285c4534 14 API calls 18571->18572 18573 7ff7285d66c4 18572->18573 18574 7ff7285d6754 18573->18574 18575 7ff7285c4a4c 45 API calls 18573->18575 18577 7ff7285d6765 18574->18577 18578 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18574->18578 18576 7ff7285d66d7 18575->18576 18580 7ff7285cdffc 5 API calls 18576->18580 18584 7ff7285d66e0 18576->18584 18579 7ff7285cfd13 18577->18579 18581 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18577->18581 18578->18577 18579->18431 18579->18432 18580->18584 18581->18579 18582 7ff7285c4534 14 API calls 18583 7ff7285d673b 18582->18583 18583->18574 18585 7ff7285d6743 SetEnvironmentVariableW 18583->18585 18584->18582 18585->18574 18587 7ff7285d01ff 18586->18587 18588 7ff7285d021c 18586->18588 18587->18448 18589 7ff7285cdd70 _findclose 11 API calls 18588->18589 18595 7ff7285d0240 18589->18595 18590 7ff7285c923c __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18592 7ff7285d02ca 18590->18592 18591 7ff7285d02a1 18593 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18591->18593 18593->18587 18594 7ff7285cdd70 _findclose 11 API calls 18594->18595 18595->18591 18595->18594 18596 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18595->18596 18597 7ff7285cf954 _wfindfirst32i64 37 API calls 18595->18597 18598 7ff7285d02b0 18595->18598 18600 7ff7285d02c4 18595->18600 18596->18595 18597->18595 18599 7ff7285c9e00 _wfindfirst32i64 17 API calls 18598->18599 18599->18600 18600->18590 18602 7ff7285c8594 18601->18602 18606 7ff7285c859d 18601->18606 18603 7ff7285c8094 40 API calls 18602->18603 18602->18606 18604 7ff7285c85a6 18603->18604 18605 7ff7285c8454 12 API calls 18604->18605 18604->18606 18605->18606 18606->18462 18606->18463 18608 7ff7285d63a9 18607->18608 18611 7ff7285d63d6 18607->18611 18609 7ff7285d63ae 18608->18609 18608->18611 18610 7ff7285c4474 _findclose 11 API calls 18609->18610 18613 7ff7285d63b3 18610->18613 18612 7ff7285d641a 18611->18612 18615 7ff7285d6439 18611->18615 18629 7ff7285d640e __crtLCMapStringW 18611->18629 18614 7ff7285c4474 _findclose 11 API calls 18612->18614 18616 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 18613->18616 18617 7ff7285d641f 18614->18617 18618 7ff7285d6443 18615->18618 18619 7ff7285d6455 18615->18619 18620 7ff7285d63be 18616->18620 18623 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 18617->18623 18621 7ff7285c4474 _findclose 11 API calls 18618->18621 18622 7ff7285c4a4c 45 API calls 18619->18622 18620->18460 18624 7ff7285d6448 18621->18624 18625 7ff7285d6462 18622->18625 18623->18629 18626 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 18624->18626 18625->18629 18931 7ff7285d7f74 18625->18931 18626->18629 18629->18460 18630 7ff7285c4474 _findclose 11 API calls 18630->18629 18632 7ff7285c8039 18631->18632 18645 7ff7285c8035 18631->18645 18654 7ff7285d1760 18632->18654 18637 7ff7285c8057 18680 7ff7285c8104 18637->18680 18638 7ff7285c804b 18639 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18638->18639 18639->18645 18642 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18643 7ff7285c807e 18642->18643 18644 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18643->18644 18644->18645 18645->18517 18646 7ff7285c8374 18645->18646 18647 7ff7285c839d 18646->18647 18652 7ff7285c83b6 18646->18652 18647->18517 18648 7ff7285cdd70 _findclose 11 API calls 18648->18652 18649 7ff7285c8446 18651 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18649->18651 18650 7ff7285cf0e8 WideCharToMultiByte 18650->18652 18651->18647 18652->18647 18652->18648 18652->18649 18652->18650 18653 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18652->18653 18653->18652 18655 7ff7285d176d 18654->18655 18659 7ff7285c803e 18654->18659 18699 7ff7285ca724 18655->18699 18660 7ff7285d1a9c GetEnvironmentStringsW 18659->18660 18661 7ff7285c8043 18660->18661 18662 7ff7285d1acc 18660->18662 18661->18637 18661->18638 18663 7ff7285cf0e8 WideCharToMultiByte 18662->18663 18664 7ff7285d1b1d 18663->18664 18665 7ff7285d1b24 FreeEnvironmentStringsW 18664->18665 18666 7ff7285ccafc _fread_nolock 12 API calls 18664->18666 18665->18661 18667 7ff7285d1b37 18666->18667 18668 7ff7285d1b3f 18667->18668 18669 7ff7285d1b48 18667->18669 18671 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18668->18671 18670 7ff7285cf0e8 WideCharToMultiByte 18669->18670 18673 7ff7285d1b6b 18670->18673 18672 7ff7285d1b46 18671->18672 18672->18665 18674 7ff7285d1b6f 18673->18674 18675 7ff7285d1b79 18673->18675 18676 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18674->18676 18677 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18675->18677 18678 7ff7285d1b77 FreeEnvironmentStringsW 18676->18678 18677->18678 18678->18661 18681 7ff7285c8129 18680->18681 18682 7ff7285cdd70 _findclose 11 API calls 18681->18682 18692 7ff7285c815f 18682->18692 18683 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18686 7ff7285c805f 18683->18686 18684 7ff7285c81da 18685 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18684->18685 18685->18686 18686->18642 18687 7ff7285cdd70 _findclose 11 API calls 18687->18692 18688 7ff7285c81c9 18689 7ff7285c8330 11 API calls 18688->18689 18691 7ff7285c81d1 18689->18691 18690 7ff7285c91dc __std_exception_copy 37 API calls 18690->18692 18693 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18691->18693 18692->18684 18692->18687 18692->18688 18692->18690 18694 7ff7285c81ff 18692->18694 18695 7ff7285c8167 18692->18695 18697 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18692->18697 18693->18695 18696 7ff7285c9e00 _wfindfirst32i64 17 API calls 18694->18696 18695->18683 18698 7ff7285c8212 18696->18698 18697->18692 18700 7ff7285ca735 FlsGetValue 18699->18700 18701 7ff7285ca750 FlsSetValue 18699->18701 18702 7ff7285ca74a 18700->18702 18703 7ff7285ca742 18700->18703 18701->18703 18704 7ff7285ca75d 18701->18704 18702->18701 18705 7ff7285ca748 18703->18705 18706 7ff7285c923c __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18703->18706 18707 7ff7285cdd70 _findclose 11 API calls 18704->18707 18719 7ff7285d1434 18705->18719 18708 7ff7285ca7c5 18706->18708 18709 7ff7285ca76c 18707->18709 18710 7ff7285ca78a FlsSetValue 18709->18710 18711 7ff7285ca77a FlsSetValue 18709->18711 18713 7ff7285ca796 FlsSetValue 18710->18713 18714 7ff7285ca7a8 18710->18714 18712 7ff7285ca783 18711->18712 18715 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18712->18715 18713->18712 18716 7ff7285ca3f4 _findclose 11 API calls 18714->18716 18715->18703 18717 7ff7285ca7b0 18716->18717 18718 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18717->18718 18718->18705 18742 7ff7285d16a4 18719->18742 18721 7ff7285d1469 18757 7ff7285d1134 18721->18757 18724 7ff7285ccafc _fread_nolock 12 API calls 18725 7ff7285d1497 18724->18725 18726 7ff7285d149f 18725->18726 18728 7ff7285d14ae 18725->18728 18727 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18726->18727 18741 7ff7285d1486 18727->18741 18728->18728 18764 7ff7285d17dc 18728->18764 18731 7ff7285d15aa 18733 7ff7285c4474 _findclose 11 API calls 18731->18733 18732 7ff7285d15c4 18734 7ff7285d1605 18732->18734 18738 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18732->18738 18735 7ff7285d15af 18733->18735 18736 7ff7285d166c 18734->18736 18775 7ff7285d0f64 18734->18775 18737 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18735->18737 18740 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18736->18740 18737->18741 18738->18734 18740->18741 18741->18659 18743 7ff7285d16c7 18742->18743 18747 7ff7285d16d1 18743->18747 18790 7ff7285cf7b8 EnterCriticalSection 18743->18790 18746 7ff7285d1743 18746->18721 18747->18746 18749 7ff7285c923c __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18747->18749 18750 7ff7285d175b 18749->18750 18752 7ff7285d17b2 18750->18752 18754 7ff7285ca724 50 API calls 18750->18754 18752->18721 18755 7ff7285d179c 18754->18755 18756 7ff7285d1434 65 API calls 18755->18756 18756->18752 18758 7ff7285c4a4c 45 API calls 18757->18758 18759 7ff7285d1148 18758->18759 18760 7ff7285d1154 GetOEMCP 18759->18760 18761 7ff7285d1166 18759->18761 18762 7ff7285d117b 18760->18762 18761->18762 18763 7ff7285d116b GetACP 18761->18763 18762->18724 18762->18741 18763->18762 18765 7ff7285d1134 47 API calls 18764->18765 18766 7ff7285d1809 18765->18766 18767 7ff7285d195f 18766->18767 18769 7ff7285d1846 IsValidCodePage 18766->18769 18774 7ff7285d1860 memcpy_s 18766->18774 18768 7ff7285badb0 _wfindfirst32i64 8 API calls 18767->18768 18771 7ff7285d15a1 18768->18771 18769->18767 18770 7ff7285d1857 18769->18770 18772 7ff7285d1886 GetCPInfo 18770->18772 18770->18774 18771->18731 18771->18732 18772->18767 18772->18774 18791 7ff7285d124c 18774->18791 18862 7ff7285cf7b8 EnterCriticalSection 18775->18862 18792 7ff7285d1289 GetCPInfo 18791->18792 18793 7ff7285d137f 18791->18793 18792->18793 18798 7ff7285d129c 18792->18798 18794 7ff7285badb0 _wfindfirst32i64 8 API calls 18793->18794 18796 7ff7285d141e 18794->18796 18796->18767 18802 7ff7285d1f90 18798->18802 18801 7ff7285d6f34 54 API calls 18801->18793 18803 7ff7285c4a4c 45 API calls 18802->18803 18804 7ff7285d1fd2 18803->18804 18805 7ff7285ce820 _fread_nolock MultiByteToWideChar 18804->18805 18807 7ff7285d2008 18805->18807 18806 7ff7285d200f 18809 7ff7285badb0 _wfindfirst32i64 8 API calls 18806->18809 18807->18806 18808 7ff7285ccafc _fread_nolock 12 API calls 18807->18808 18810 7ff7285d20cc 18807->18810 18813 7ff7285d2038 memcpy_s 18807->18813 18808->18813 18811 7ff7285d1313 18809->18811 18810->18806 18812 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18810->18812 18817 7ff7285d6f34 18811->18817 18812->18806 18813->18810 18814 7ff7285ce820 _fread_nolock MultiByteToWideChar 18813->18814 18815 7ff7285d20ae 18814->18815 18815->18810 18816 7ff7285d20b2 GetStringTypeW 18815->18816 18816->18810 18818 7ff7285c4a4c 45 API calls 18817->18818 18819 7ff7285d6f59 18818->18819 18822 7ff7285d6c00 18819->18822 18823 7ff7285d6c41 18822->18823 18824 7ff7285ce820 _fread_nolock MultiByteToWideChar 18823->18824 18827 7ff7285d6c8b 18824->18827 18825 7ff7285d6f09 18826 7ff7285badb0 _wfindfirst32i64 8 API calls 18825->18826 18828 7ff7285d1346 18826->18828 18827->18825 18829 7ff7285ccafc _fread_nolock 12 API calls 18827->18829 18830 7ff7285d6dc1 18827->18830 18832 7ff7285d6cc3 18827->18832 18828->18801 18829->18832 18830->18825 18831 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18830->18831 18831->18825 18832->18830 18833 7ff7285ce820 _fread_nolock MultiByteToWideChar 18832->18833 18834 7ff7285d6d36 18833->18834 18834->18830 18853 7ff7285ce1bc 18834->18853 18837 7ff7285d6d81 18837->18830 18840 7ff7285ce1bc __crtLCMapStringW 6 API calls 18837->18840 18838 7ff7285d6dd2 18839 7ff7285ccafc _fread_nolock 12 API calls 18838->18839 18841 7ff7285d6ea4 18838->18841 18842 7ff7285d6df0 18838->18842 18839->18842 18840->18830 18841->18830 18843 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18841->18843 18842->18830 18844 7ff7285ce1bc __crtLCMapStringW 6 API calls 18842->18844 18843->18830 18845 7ff7285d6e70 18844->18845 18845->18841 18846 7ff7285d6ea6 18845->18846 18847 7ff7285d6e90 18845->18847 18849 7ff7285cf0e8 WideCharToMultiByte 18846->18849 18848 7ff7285cf0e8 WideCharToMultiByte 18847->18848 18850 7ff7285d6e9e 18848->18850 18849->18850 18850->18841 18851 7ff7285d6ebe 18850->18851 18851->18830 18852 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18851->18852 18852->18830 18854 7ff7285cdde8 __crtLCMapStringW 5 API calls 18853->18854 18855 7ff7285ce1fa 18854->18855 18856 7ff7285ce202 18855->18856 18859 7ff7285ce2a8 18855->18859 18856->18830 18856->18837 18856->18838 18858 7ff7285ce26b LCMapStringW 18858->18856 18860 7ff7285cdde8 __crtLCMapStringW 5 API calls 18859->18860 18861 7ff7285ce2d6 __crtLCMapStringW 18860->18861 18861->18858 18864 7ff7285d5710 18863->18864 18865 7ff7285d56f9 18863->18865 18864->18865 18868 7ff7285d571e 18864->18868 18866 7ff7285c4474 _findclose 11 API calls 18865->18866 18867 7ff7285d56fe 18866->18867 18869 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 18867->18869 18870 7ff7285c4a4c 45 API calls 18868->18870 18871 7ff7285d5709 18868->18871 18869->18871 18870->18871 18871->18533 18873 7ff7285c4a4c 45 API calls 18872->18873 18874 7ff7285d83dd 18873->18874 18877 7ff7285d8034 18874->18877 18879 7ff7285d8082 18877->18879 18878 7ff7285badb0 _wfindfirst32i64 8 API calls 18880 7ff7285d65b5 18878->18880 18881 7ff7285d8109 18879->18881 18883 7ff7285d80f4 GetCPInfo 18879->18883 18886 7ff7285d810d 18879->18886 18880->18533 18880->18557 18882 7ff7285ce820 _fread_nolock MultiByteToWideChar 18881->18882 18881->18886 18884 7ff7285d81a1 18882->18884 18883->18881 18883->18886 18885 7ff7285ccafc _fread_nolock 12 API calls 18884->18885 18884->18886 18887 7ff7285d81d8 18884->18887 18885->18887 18886->18878 18887->18886 18888 7ff7285ce820 _fread_nolock MultiByteToWideChar 18887->18888 18889 7ff7285d8246 18888->18889 18890 7ff7285d8328 18889->18890 18891 7ff7285ce820 _fread_nolock MultiByteToWideChar 18889->18891 18890->18886 18892 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18890->18892 18893 7ff7285d826c 18891->18893 18892->18886 18893->18890 18894 7ff7285ccafc _fread_nolock 12 API calls 18893->18894 18895 7ff7285d8299 18893->18895 18894->18895 18895->18890 18896 7ff7285ce820 _fread_nolock MultiByteToWideChar 18895->18896 18897 7ff7285d8310 18896->18897 18898 7ff7285d8316 18897->18898 18899 7ff7285d8330 18897->18899 18898->18890 18901 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18898->18901 18906 7ff7285ce040 18899->18906 18901->18890 18903 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18904 7ff7285d836f 18903->18904 18904->18886 18905 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18904->18905 18905->18886 18907 7ff7285cdde8 __crtLCMapStringW 5 API calls 18906->18907 18908 7ff7285ce07e 18907->18908 18909 7ff7285ce2a8 __crtLCMapStringW 5 API calls 18908->18909 18910 7ff7285ce086 18908->18910 18911 7ff7285ce0ef CompareStringW 18909->18911 18910->18903 18910->18904 18911->18910 18913 7ff7285d6ff1 18912->18913 18914 7ff7285d700a HeapSize 18912->18914 18915 7ff7285c4474 _findclose 11 API calls 18913->18915 18916 7ff7285d6ff6 18915->18916 18917 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 18916->18917 18918 7ff7285d7001 18917->18918 18918->18564 18920 7ff7285cf9d1 18919->18920 18921 7ff7285cf9db 18919->18921 18923 7ff7285ccafc _fread_nolock 12 API calls 18920->18923 18922 7ff7285cf9e0 18921->18922 18929 7ff7285cf9e7 _findclose 18921->18929 18924 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18922->18924 18927 7ff7285cf9d9 18923->18927 18924->18927 18925 7ff7285cf9ed 18928 7ff7285c4474 _findclose 11 API calls 18925->18928 18926 7ff7285cfa1a HeapReAlloc 18926->18927 18926->18929 18927->18566 18928->18927 18929->18925 18929->18926 18930 7ff7285d26e0 _findclose 2 API calls 18929->18930 18930->18929 18933 7ff7285d7f9d __crtLCMapStringW 18931->18933 18932 7ff7285d649e 18932->18629 18932->18630 18933->18932 18934 7ff7285ce040 6 API calls 18933->18934 18934->18932 14892 7ff7285ba650 14893 7ff7285ba673 14892->14893 14894 7ff7285ba68f memcpy_s 14892->14894 14895 7ff7285ccafc 12 API calls 14893->14895 14895->14894 19258 7ff7285ca4d0 19259 7ff7285ca4d5 19258->19259 19260 7ff7285ca4ea 19258->19260 19264 7ff7285ca4f0 19259->19264 19265 7ff7285ca532 19264->19265 19266 7ff7285ca53a 19264->19266 19267 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19265->19267 19268 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19266->19268 19267->19266 19269 7ff7285ca547 19268->19269 19270 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19269->19270 19271 7ff7285ca554 19270->19271 19272 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19271->19272 19273 7ff7285ca561 19272->19273 19274 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19273->19274 19275 7ff7285ca56e 19274->19275 19276 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19275->19276 19277 7ff7285ca57b 19276->19277 19278 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19277->19278 19279 7ff7285ca588 19278->19279 19280 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19279->19280 19281 7ff7285ca595 19280->19281 19282 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19281->19282 19283 7ff7285ca5a5 19282->19283 19284 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19283->19284 19285 7ff7285ca5b5 19284->19285 19290 7ff7285ca394 19285->19290 19304 7ff7285cf7b8 EnterCriticalSection 19290->19304 19306 7ff7285d05d0 19324 7ff7285cf7b8 EnterCriticalSection 19306->19324 14956 7ff7285bb1cc 14979 7ff7285bb39c 14956->14979 14959 7ff7285bb318 15085 7ff7285bb6cc IsProcessorFeaturePresent 14959->15085 14960 7ff7285bb1e8 __scrt_acquire_startup_lock 14962 7ff7285bb322 14960->14962 14963 7ff7285bb206 14960->14963 14964 7ff7285bb6cc 7 API calls 14962->14964 14970 7ff7285bb227 __scrt_release_startup_lock 14963->14970 14987 7ff7285c86a4 14963->14987 14967 7ff7285bb32d __FrameHandler3::FrameUnwindToEmptyState 14964->14967 14966 7ff7285bb22b 14968 7ff7285bb2b1 14991 7ff7285bb818 14968->14991 14970->14966 14970->14968 15074 7ff7285c89b4 14970->15074 14971 7ff7285bb2b6 14994 7ff7285b1000 14971->14994 14976 7ff7285bb2d9 14976->14967 15081 7ff7285bb530 14976->15081 15092 7ff7285bb99c 14979->15092 14982 7ff7285bb1e0 14982->14959 14982->14960 14983 7ff7285bb3cb 15094 7ff7285c90bc 14983->15094 14988 7ff7285c86b7 14987->14988 14989 7ff7285c86de 14988->14989 15137 7ff7285bb0e0 14988->15137 14989->14970 15215 7ff7285bc240 14991->15215 14995 7ff7285b100b 14994->14995 15217 7ff7285b7630 14995->15217 14997 7ff7285b101d 15224 7ff7285c4f44 14997->15224 14999 7ff7285b369b 15231 7ff7285b1af0 14999->15231 15003 7ff7285badb0 _wfindfirst32i64 8 API calls 15004 7ff7285b37ce 15003->15004 15079 7ff7285bb85c GetModuleHandleW 15004->15079 15005 7ff7285b36b9 15066 7ff7285b37ba 15005->15066 15247 7ff7285b3b40 15005->15247 15007 7ff7285b36eb 15007->15066 15250 7ff7285b69b0 15007->15250 15009 7ff7285b3707 15010 7ff7285b3753 15009->15010 15012 7ff7285b69b0 61 API calls 15009->15012 15265 7ff7285b6fc0 15010->15265 15016 7ff7285b3728 __vcrt_freefls 15012->15016 15013 7ff7285b3768 15269 7ff7285b19d0 15013->15269 15016->15010 15020 7ff7285b6fc0 58 API calls 15016->15020 15017 7ff7285b385d 15018 7ff7285b3888 15017->15018 15360 7ff7285b32a0 15017->15360 15027 7ff7285b38cb 15018->15027 15364 7ff7285b7a60 15018->15364 15019 7ff7285b19d0 121 API calls 15023 7ff7285b379e 15019->15023 15020->15010 15025 7ff7285b37a2 15023->15025 15026 7ff7285b37e0 15023->15026 15024 7ff7285b38a8 15028 7ff7285b38ad 15024->15028 15029 7ff7285b38be SetDllDirectoryW 15024->15029 15324 7ff7285b2770 15025->15324 15026->15017 15337 7ff7285b3cd0 15026->15337 15280 7ff7285b5e60 15027->15280 15032 7ff7285b2770 59 API calls 15028->15032 15029->15027 15032->15066 15036 7ff7285b3802 15041 7ff7285b2770 59 API calls 15036->15041 15039 7ff7285b38e8 15063 7ff7285b391a 15039->15063 15388 7ff7285b5660 15039->15388 15040 7ff7285b3830 15040->15017 15043 7ff7285b3835 15040->15043 15041->15066 15042 7ff7285b39e6 15284 7ff7285b3130 15042->15284 15356 7ff7285bf2dc 15043->15356 15049 7ff7285b3939 15055 7ff7285b3985 15049->15055 15430 7ff7285b1b30 15049->15430 15050 7ff7285b391c 15424 7ff7285b58b0 15050->15424 15055->15066 15434 7ff7285b30d0 15055->15434 15057 7ff7285b3a1b 15059 7ff7285b69b0 61 API calls 15057->15059 15058 7ff7285b390b 15418 7ff7285b5cb0 15058->15418 15065 7ff7285b3a27 15059->15065 15062 7ff7285b39c1 15064 7ff7285b58b0 FreeLibrary 15062->15064 15063->15042 15063->15049 15064->15066 15065->15066 15301 7ff7285b7000 15065->15301 15066->15003 15075 7ff7285c89cb 15074->15075 15076 7ff7285c89ec 15074->15076 15075->14968 17860 7ff7285c9108 15076->17860 15080 7ff7285bb86d 15079->15080 15080->14976 15083 7ff7285bb541 15081->15083 15082 7ff7285bb2f0 15082->14966 15083->15082 15084 7ff7285bcaf8 __scrt_initialize_crt 7 API calls 15083->15084 15084->15082 15086 7ff7285bb6f2 _wfindfirst32i64 memcpy_s 15085->15086 15087 7ff7285bb711 RtlCaptureContext RtlLookupFunctionEntry 15086->15087 15088 7ff7285bb776 memcpy_s 15087->15088 15089 7ff7285bb73a RtlVirtualUnwind 15087->15089 15090 7ff7285bb7a8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15088->15090 15089->15088 15091 7ff7285bb7fa _wfindfirst32i64 15090->15091 15091->14962 15093 7ff7285bb3be __scrt_dllmain_crt_thread_attach 15092->15093 15093->14982 15093->14983 15095 7ff7285d25fc 15094->15095 15096 7ff7285bb3d0 15095->15096 15104 7ff7285cba20 15095->15104 15096->14982 15098 7ff7285bcaf8 15096->15098 15099 7ff7285bcb00 15098->15099 15100 7ff7285bcb0a 15098->15100 15116 7ff7285bce74 15099->15116 15100->14982 15115 7ff7285cf7b8 EnterCriticalSection 15104->15115 15117 7ff7285bcb05 15116->15117 15118 7ff7285bce83 15116->15118 15120 7ff7285bcee0 15117->15120 15124 7ff7285bd0b0 15118->15124 15121 7ff7285bcf0b 15120->15121 15122 7ff7285bcf0f 15121->15122 15123 7ff7285bceee DeleteCriticalSection 15121->15123 15122->15100 15123->15121 15128 7ff7285bcf18 15124->15128 15129 7ff7285bd032 TlsFree 15128->15129 15135 7ff7285bcf5c __vcrt_InitializeCriticalSectionEx 15128->15135 15130 7ff7285bcf8a LoadLibraryExW 15132 7ff7285bd001 15130->15132 15133 7ff7285bcfab GetLastError 15130->15133 15131 7ff7285bd021 GetProcAddress 15131->15129 15132->15131 15134 7ff7285bd018 FreeLibrary 15132->15134 15133->15135 15134->15131 15135->15129 15135->15130 15135->15131 15136 7ff7285bcfcd LoadLibraryExW 15135->15136 15136->15132 15136->15135 15138 7ff7285bb0f0 15137->15138 15154 7ff7285c57cc 15138->15154 15140 7ff7285bb0fc 15160 7ff7285bb3e8 15140->15160 15142 7ff7285bb6cc 7 API calls 15144 7ff7285bb195 15142->15144 15143 7ff7285bb114 _RTC_Initialize 15152 7ff7285bb169 15143->15152 15165 7ff7285bb598 15143->15165 15144->14988 15146 7ff7285bb129 15168 7ff7285c7e9c 15146->15168 15152->15142 15153 7ff7285bb185 15152->15153 15153->14988 15155 7ff7285c57dd 15154->15155 15156 7ff7285c57e5 15155->15156 15157 7ff7285c4474 _findclose 11 API calls 15155->15157 15156->15140 15158 7ff7285c57f4 15157->15158 15159 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 15158->15159 15159->15156 15161 7ff7285bb3f9 15160->15161 15164 7ff7285bb3fe __scrt_release_startup_lock 15160->15164 15162 7ff7285bb6cc 7 API calls 15161->15162 15161->15164 15163 7ff7285bb472 15162->15163 15164->15143 15194 7ff7285bb55c 15165->15194 15167 7ff7285bb5a1 15167->15146 15169 7ff7285c7ebc 15168->15169 15170 7ff7285bb135 15168->15170 15171 7ff7285c7ec4 15169->15171 15172 7ff7285c7eda GetModuleFileNameW 15169->15172 15170->15152 15193 7ff7285bb66c InitializeSListHead 15170->15193 15173 7ff7285c4474 _findclose 11 API calls 15171->15173 15176 7ff7285c7f05 15172->15176 15174 7ff7285c7ec9 15173->15174 15175 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 15174->15175 15175->15170 15209 7ff7285c7e3c 15176->15209 15179 7ff7285c7f4d 15180 7ff7285c4474 _findclose 11 API calls 15179->15180 15181 7ff7285c7f52 15180->15181 15184 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15181->15184 15182 7ff7285c7f87 15186 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15182->15186 15183 7ff7285c7f65 15183->15182 15187 7ff7285c7fb3 15183->15187 15188 7ff7285c7fcc 15183->15188 15185 7ff7285c7f60 15184->15185 15185->15170 15186->15170 15189 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15187->15189 15191 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15188->15191 15190 7ff7285c7fbc 15189->15190 15192 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15190->15192 15191->15182 15192->15185 15195 7ff7285bb576 15194->15195 15197 7ff7285bb56f 15194->15197 15198 7ff7285c8f1c 15195->15198 15197->15167 15201 7ff7285c8b58 15198->15201 15208 7ff7285cf7b8 EnterCriticalSection 15201->15208 15210 7ff7285c7e8c 15209->15210 15211 7ff7285c7e54 15209->15211 15210->15179 15210->15183 15211->15210 15212 7ff7285cdd70 _findclose 11 API calls 15211->15212 15213 7ff7285c7e82 15212->15213 15214 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15213->15214 15214->15210 15216 7ff7285bb82f GetStartupInfoW 15215->15216 15216->14971 15219 7ff7285b764f 15217->15219 15218 7ff7285b76a0 WideCharToMultiByte 15218->15219 15221 7ff7285b7748 15218->15221 15219->15218 15219->15221 15222 7ff7285b76f6 WideCharToMultiByte 15219->15222 15223 7ff7285b7657 __vcrt_freefls 15219->15223 15489 7ff7285b2620 15221->15489 15222->15219 15222->15221 15223->14997 15227 7ff7285cec70 15224->15227 15225 7ff7285cecc3 15226 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15225->15226 15230 7ff7285cecec 15226->15230 15227->15225 15228 7ff7285ced16 15227->15228 15879 7ff7285ceb48 15228->15879 15230->14999 15232 7ff7285b1b05 15231->15232 15233 7ff7285b1b20 15232->15233 15887 7ff7285b24d0 15232->15887 15233->15066 15235 7ff7285b3bc0 15233->15235 15236 7ff7285bade0 15235->15236 15237 7ff7285b3bcc GetModuleFileNameW 15236->15237 15238 7ff7285b3c12 15237->15238 15239 7ff7285b3bfb 15237->15239 15927 7ff7285b7b70 15238->15927 15241 7ff7285b2620 57 API calls 15239->15241 15243 7ff7285b3c0e 15241->15243 15245 7ff7285badb0 _wfindfirst32i64 8 API calls 15243->15245 15244 7ff7285b2770 59 API calls 15244->15243 15246 7ff7285b3c4f 15245->15246 15246->15005 15248 7ff7285b1b30 49 API calls 15247->15248 15249 7ff7285b3b5d 15248->15249 15249->15007 15251 7ff7285b69ba 15250->15251 15252 7ff7285b7a60 57 API calls 15251->15252 15253 7ff7285b69dc GetEnvironmentVariableW 15252->15253 15254 7ff7285b6a46 15253->15254 15255 7ff7285b69f4 ExpandEnvironmentStringsW 15253->15255 15256 7ff7285badb0 _wfindfirst32i64 8 API calls 15254->15256 15257 7ff7285b7b70 59 API calls 15255->15257 15258 7ff7285b6a58 15256->15258 15259 7ff7285b6a1c 15257->15259 15258->15009 15259->15254 15260 7ff7285b6a26 15259->15260 15938 7ff7285c913c 15260->15938 15263 7ff7285badb0 _wfindfirst32i64 8 API calls 15264 7ff7285b6a3e 15263->15264 15264->15009 15266 7ff7285b7a60 57 API calls 15265->15266 15267 7ff7285b6fd7 SetEnvironmentVariableW 15266->15267 15268 7ff7285b6fef __vcrt_freefls 15267->15268 15268->15013 15270 7ff7285b1b30 49 API calls 15269->15270 15271 7ff7285b1a00 15270->15271 15272 7ff7285b1b30 49 API calls 15271->15272 15278 7ff7285b1a7a 15271->15278 15273 7ff7285b1a22 15272->15273 15274 7ff7285b3b40 49 API calls 15273->15274 15273->15278 15275 7ff7285b1a3b 15274->15275 15945 7ff7285b17b0 15275->15945 15278->15017 15278->15019 15279 7ff7285bf2dc 74 API calls 15279->15278 15281 7ff7285b5e75 15280->15281 15282 7ff7285b38d0 15281->15282 15283 7ff7285b24d0 59 API calls 15281->15283 15282->15063 15378 7ff7285b5b00 15282->15378 15283->15282 15290 7ff7285b31a3 15284->15290 15293 7ff7285b31e4 15284->15293 15285 7ff7285b3223 15286 7ff7285badb0 _wfindfirst32i64 8 API calls 15285->15286 15288 7ff7285b3235 15286->15288 15287 7ff7285b1ab0 74 API calls 15287->15293 15288->15066 15294 7ff7285b6f50 15288->15294 15290->15293 16018 7ff7285b1440 15290->16018 16052 7ff7285b29b0 15290->16052 16107 7ff7285b1780 15290->16107 15293->15285 15293->15287 15295 7ff7285b7a60 57 API calls 15294->15295 15296 7ff7285b6f6f 15295->15296 15297 7ff7285b7a60 57 API calls 15296->15297 15298 7ff7285b6f7f 15297->15298 15299 7ff7285c66e4 38 API calls 15298->15299 15300 7ff7285b6f8d __vcrt_freefls 15299->15300 15300->15057 15302 7ff7285b7010 15301->15302 15303 7ff7285b7a60 57 API calls 15302->15303 15304 7ff7285b7041 SetConsoleCtrlHandler GetStartupInfoW 15303->15304 15305 7ff7285b70a2 15304->15305 16973 7ff7285c91b4 15305->16973 15325 7ff7285b2790 15324->15325 15326 7ff7285c3c14 49 API calls 15325->15326 15327 7ff7285b27db memcpy_s 15326->15327 15328 7ff7285b7a60 57 API calls 15327->15328 15329 7ff7285b2810 15328->15329 15330 7ff7285b2815 15329->15330 15331 7ff7285b284d MessageBoxA 15329->15331 15332 7ff7285b7a60 57 API calls 15330->15332 15333 7ff7285b2867 15331->15333 15334 7ff7285b282f MessageBoxW 15332->15334 15335 7ff7285badb0 _wfindfirst32i64 8 API calls 15333->15335 15334->15333 15336 7ff7285b2877 15335->15336 15336->15066 15338 7ff7285b3cdc 15337->15338 15339 7ff7285b7a60 57 API calls 15338->15339 15340 7ff7285b3d07 15339->15340 15341 7ff7285b7a60 57 API calls 15340->15341 15342 7ff7285b3d1a 15341->15342 16991 7ff7285c54f8 15342->16991 15345 7ff7285badb0 _wfindfirst32i64 8 API calls 15346 7ff7285b37fa 15345->15346 15346->15036 15347 7ff7285b7230 15346->15347 15348 7ff7285b7254 15347->15348 15349 7ff7285b732b __vcrt_freefls 15348->15349 15350 7ff7285bf964 73 API calls 15348->15350 15349->15040 15351 7ff7285b726e 15350->15351 15351->15349 17370 7ff7285c7968 15351->17370 15353 7ff7285b7283 15353->15349 15354 7ff7285bf964 73 API calls 15353->15354 15355 7ff7285bf62c _fread_nolock 53 API calls 15353->15355 15354->15353 15355->15353 15357 7ff7285bf30c 15356->15357 17385 7ff7285bf0b8 15357->17385 15359 7ff7285bf325 15359->15036 15361 7ff7285b32b7 15360->15361 15362 7ff7285b32e0 15360->15362 15361->15362 15363 7ff7285b1780 59 API calls 15361->15363 15362->15018 15363->15361 15365 7ff7285b7a81 MultiByteToWideChar 15364->15365 15366 7ff7285b7b07 MultiByteToWideChar 15364->15366 15367 7ff7285b7aa7 15365->15367 15368 7ff7285b7acc 15365->15368 15369 7ff7285b7b4f 15366->15369 15370 7ff7285b7b2a 15366->15370 15371 7ff7285b2620 55 API calls 15367->15371 15368->15366 15375 7ff7285b7ae2 15368->15375 15369->15024 15372 7ff7285b2620 55 API calls 15370->15372 15373 7ff7285b7aba 15371->15373 15374 7ff7285b7b3d 15372->15374 15373->15024 15374->15024 15376 7ff7285b2620 55 API calls 15375->15376 15377 7ff7285b7af5 15376->15377 15377->15024 15379 7ff7285b5b24 15378->15379 15383 7ff7285b5b51 15378->15383 15380 7ff7285b5b4c 15379->15380 15381 7ff7285b1780 59 API calls 15379->15381 15379->15383 15387 7ff7285b5b47 memcpy_s __vcrt_freefls 15379->15387 17396 7ff7285b12b0 15380->17396 15381->15379 15383->15387 17422 7ff7285b3d50 15383->17422 15385 7ff7285b5bb7 15386 7ff7285b2770 59 API calls 15385->15386 15385->15387 15386->15387 15387->15039 15402 7ff7285b567a memcpy_s 15388->15402 15390 7ff7285b579f 15392 7ff7285b3d50 49 API calls 15390->15392 15391 7ff7285b57bb 15394 7ff7285b2770 59 API calls 15391->15394 15393 7ff7285b5818 15392->15393 15397 7ff7285b3d50 49 API calls 15393->15397 15398 7ff7285b57b1 __vcrt_freefls 15394->15398 15395 7ff7285b3d50 49 API calls 15395->15402 15396 7ff7285b5780 15396->15390 15399 7ff7285b3d50 49 API calls 15396->15399 15400 7ff7285b5848 15397->15400 15401 7ff7285badb0 _wfindfirst32i64 8 API calls 15398->15401 15399->15390 15404 7ff7285b3d50 49 API calls 15400->15404 15403 7ff7285b38f9 15401->15403 15402->15390 15402->15391 15402->15395 15402->15396 15402->15402 15405 7ff7285b1440 161 API calls 15402->15405 15406 7ff7285b57a1 15402->15406 17425 7ff7285b1650 15402->17425 15403->15050 15408 7ff7285b55e0 15403->15408 15404->15398 15405->15402 15407 7ff7285b2770 59 API calls 15406->15407 15407->15398 17430 7ff7285b71e0 15408->17430 15410 7ff7285b55fc 15411 7ff7285b71e0 58 API calls 15410->15411 15412 7ff7285b560f 15411->15412 15413 7ff7285b5645 15412->15413 15415 7ff7285b5627 15412->15415 15414 7ff7285b2770 59 API calls 15413->15414 15417 7ff7285b3907 15414->15417 17434 7ff7285b5f70 GetProcAddress 15415->17434 15417->15050 15417->15058 15419 7ff7285b5cd4 15418->15419 15420 7ff7285b2770 59 API calls 15419->15420 15423 7ff7285b5d4a 15419->15423 15423->15063 15428 7ff7285b58ed 15424->15428 15429 7ff7285b58c2 15424->15429 15425 7ff7285b59ab 15425->15428 17494 7ff7285b71c0 FreeLibrary 15425->17494 15428->15063 15429->15425 15429->15428 17493 7ff7285b71c0 FreeLibrary 15429->17493 15431 7ff7285b1b55 15430->15431 15432 7ff7285c3c14 49 API calls 15431->15432 15433 7ff7285b1b78 15432->15433 15433->15055 17495 7ff7285b4980 15434->17495 15437 7ff7285b311d 15437->15062 15439 7ff7285b30f4 15439->15437 17551 7ff7285b4700 15439->17551 15508 7ff7285bade0 15489->15508 15492 7ff7285b2669 15510 7ff7285c3c14 15492->15510 15497 7ff7285b1b30 49 API calls 15498 7ff7285b26c6 memcpy_s 15497->15498 15499 7ff7285b7a60 54 API calls 15498->15499 15500 7ff7285b26fb 15499->15500 15501 7ff7285b2700 15500->15501 15502 7ff7285b2738 MessageBoxA 15500->15502 15503 7ff7285b7a60 54 API calls 15501->15503 15504 7ff7285b2752 15502->15504 15505 7ff7285b271a MessageBoxW 15503->15505 15506 7ff7285badb0 _wfindfirst32i64 8 API calls 15504->15506 15505->15504 15507 7ff7285b2762 15506->15507 15507->15223 15509 7ff7285b263c GetLastError 15508->15509 15509->15492 15513 7ff7285c3c6e 15510->15513 15511 7ff7285c3c93 15514 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15511->15514 15512 7ff7285c3ccf 15540 7ff7285c1ea0 15512->15540 15513->15511 15513->15512 15527 7ff7285c3cbd 15514->15527 15516 7ff7285c3dac 15517 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15516->15517 15517->15527 15518 7ff7285badb0 _wfindfirst32i64 8 API calls 15520 7ff7285b2697 15518->15520 15528 7ff7285b74e0 15520->15528 15521 7ff7285c3d81 15525 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15521->15525 15522 7ff7285c3dd0 15522->15516 15524 7ff7285c3dda 15522->15524 15523 7ff7285c3d78 15523->15516 15523->15521 15526 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15524->15526 15525->15527 15526->15527 15527->15518 15529 7ff7285b74ec 15528->15529 15530 7ff7285b7507 GetLastError 15529->15530 15531 7ff7285b750d FormatMessageW 15529->15531 15530->15531 15532 7ff7285b7540 15531->15532 15533 7ff7285b755c WideCharToMultiByte 15531->15533 15534 7ff7285b2620 54 API calls 15532->15534 15535 7ff7285b7553 15533->15535 15536 7ff7285b7596 15533->15536 15534->15535 15538 7ff7285badb0 _wfindfirst32i64 8 API calls 15535->15538 15537 7ff7285b2620 54 API calls 15536->15537 15537->15535 15539 7ff7285b269e 15538->15539 15539->15497 15541 7ff7285c1ede 15540->15541 15542 7ff7285c1ece 15540->15542 15543 7ff7285c1ee7 15541->15543 15547 7ff7285c1f15 15541->15547 15544 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15542->15544 15545 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15543->15545 15546 7ff7285c1f0d 15544->15546 15545->15546 15546->15516 15546->15521 15546->15522 15546->15523 15547->15542 15547->15546 15550 7ff7285c21c4 15547->15550 15554 7ff7285c2830 15547->15554 15580 7ff7285c24f8 15547->15580 15610 7ff7285c1d80 15547->15610 15613 7ff7285c3a50 15547->15613 15552 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15550->15552 15552->15542 15555 7ff7285c2872 15554->15555 15556 7ff7285c28e5 15554->15556 15557 7ff7285c290f 15555->15557 15558 7ff7285c2878 15555->15558 15559 7ff7285c293f 15556->15559 15560 7ff7285c28ea 15556->15560 15637 7ff7285c0de0 15557->15637 15567 7ff7285c287d 15558->15567 15571 7ff7285c294e 15558->15571 15559->15557 15559->15571 15579 7ff7285c28a8 15559->15579 15561 7ff7285c291f 15560->15561 15562 7ff7285c28ec 15560->15562 15644 7ff7285c09d0 15561->15644 15564 7ff7285c288d 15562->15564 15570 7ff7285c28fb 15562->15570 15577 7ff7285c297d 15564->15577 15619 7ff7285c3194 15564->15619 15567->15564 15569 7ff7285c28c0 15567->15569 15567->15579 15569->15577 15629 7ff7285c3650 15569->15629 15570->15557 15573 7ff7285c2900 15570->15573 15571->15577 15651 7ff7285c11f0 15571->15651 15573->15577 15633 7ff7285c37e8 15573->15633 15574 7ff7285badb0 _wfindfirst32i64 8 API calls 15576 7ff7285c2c13 15574->15576 15576->15547 15577->15574 15579->15577 15658 7ff7285cda30 15579->15658 15581 7ff7285c2503 15580->15581 15582 7ff7285c2519 15580->15582 15583 7ff7285c2872 15581->15583 15584 7ff7285c28e5 15581->15584 15593 7ff7285c2557 15581->15593 15585 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15582->15585 15582->15593 15586 7ff7285c290f 15583->15586 15587 7ff7285c2878 15583->15587 15588 7ff7285c293f 15584->15588 15589 7ff7285c28ea 15584->15589 15585->15593 15592 7ff7285c0de0 38 API calls 15586->15592 15596 7ff7285c287d 15587->15596 15600 7ff7285c294e 15587->15600 15588->15586 15588->15600 15608 7ff7285c28a8 15588->15608 15590 7ff7285c291f 15589->15590 15591 7ff7285c28ec 15589->15591 15594 7ff7285c09d0 38 API calls 15590->15594 15598 7ff7285c28fb 15591->15598 15604 7ff7285c288d 15591->15604 15592->15608 15593->15547 15594->15608 15595 7ff7285c3194 47 API calls 15595->15608 15599 7ff7285c28c0 15596->15599 15596->15604 15596->15608 15597 7ff7285c11f0 38 API calls 15597->15608 15598->15586 15602 7ff7285c2900 15598->15602 15601 7ff7285c3650 47 API calls 15599->15601 15609 7ff7285c297d 15599->15609 15600->15597 15600->15609 15601->15608 15605 7ff7285c37e8 37 API calls 15602->15605 15602->15609 15603 7ff7285badb0 _wfindfirst32i64 8 API calls 15606 7ff7285c2c13 15603->15606 15604->15595 15604->15609 15605->15608 15606->15547 15607 7ff7285cda30 47 API calls 15607->15608 15608->15607 15608->15609 15609->15603 15807 7ff7285bffa4 15610->15807 15614 7ff7285c3a67 15613->15614 15824 7ff7285ccb90 15614->15824 15620 7ff7285c31b6 15619->15620 15668 7ff7285bfe10 15620->15668 15625 7ff7285c3a50 45 API calls 15626 7ff7285c32f3 15625->15626 15627 7ff7285c3a50 45 API calls 15626->15627 15628 7ff7285c337c 15626->15628 15627->15628 15628->15579 15630 7ff7285c3668 15629->15630 15632 7ff7285c36d0 15629->15632 15631 7ff7285cda30 47 API calls 15630->15631 15630->15632 15631->15632 15632->15579 15636 7ff7285c3809 15633->15636 15634 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15635 7ff7285c383a 15634->15635 15635->15579 15636->15634 15636->15635 15638 7ff7285c0e13 15637->15638 15639 7ff7285c0e42 15638->15639 15641 7ff7285c0eff 15638->15641 15640 7ff7285bfe10 12 API calls 15639->15640 15643 7ff7285c0e7f 15639->15643 15640->15643 15642 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15641->15642 15642->15643 15643->15579 15645 7ff7285c0a03 15644->15645 15646 7ff7285c0a32 15645->15646 15648 7ff7285c0aef 15645->15648 15647 7ff7285bfe10 12 API calls 15646->15647 15650 7ff7285c0a6f 15646->15650 15647->15650 15649 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15648->15649 15649->15650 15650->15579 15652 7ff7285c1223 15651->15652 15653 7ff7285c1252 15652->15653 15655 7ff7285c130f 15652->15655 15654 7ff7285bfe10 12 API calls 15653->15654 15657 7ff7285c128f 15653->15657 15654->15657 15656 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15655->15656 15656->15657 15657->15579 15660 7ff7285cda58 15658->15660 15659 7ff7285cda9d 15664 7ff7285cda5d memcpy_s 15659->15664 15667 7ff7285cda86 memcpy_s 15659->15667 15804 7ff7285cf0e8 15659->15804 15660->15659 15662 7ff7285c3a50 45 API calls 15660->15662 15660->15664 15660->15667 15661 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15661->15664 15662->15659 15664->15579 15667->15661 15667->15664 15669 7ff7285bfe47 15668->15669 15675 7ff7285bfe36 15668->15675 15670 7ff7285ccafc _fread_nolock 12 API calls 15669->15670 15669->15675 15671 7ff7285bfe74 15670->15671 15672 7ff7285bfe88 15671->15672 15673 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15671->15673 15674 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15672->15674 15673->15672 15674->15675 15676 7ff7285cd748 15675->15676 15677 7ff7285cd765 15676->15677 15678 7ff7285cd798 15676->15678 15679 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15677->15679 15678->15677 15680 7ff7285cd7ca 15678->15680 15689 7ff7285c32d1 15679->15689 15686 7ff7285cd8dd 15680->15686 15693 7ff7285cd812 15680->15693 15681 7ff7285cd9cf 15731 7ff7285ccc34 15681->15731 15683 7ff7285cd995 15724 7ff7285ccfcc 15683->15724 15685 7ff7285cd964 15717 7ff7285cd2ac 15685->15717 15686->15681 15686->15683 15686->15685 15688 7ff7285cd927 15686->15688 15690 7ff7285cd91d 15686->15690 15707 7ff7285cd4dc 15688->15707 15689->15625 15689->15626 15690->15683 15692 7ff7285cd922 15690->15692 15692->15685 15692->15688 15693->15689 15698 7ff7285c91dc 15693->15698 15696 7ff7285c9e00 _wfindfirst32i64 17 API calls 15697 7ff7285cda2c 15696->15697 15699 7ff7285c91f3 15698->15699 15700 7ff7285c91e9 15698->15700 15701 7ff7285c4474 _findclose 11 API calls 15699->15701 15700->15699 15702 7ff7285c920e 15700->15702 15706 7ff7285c91fa 15701->15706 15704 7ff7285c9206 15702->15704 15705 7ff7285c4474 _findclose 11 API calls 15702->15705 15703 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 15703->15704 15704->15689 15704->15696 15705->15706 15706->15703 15740 7ff7285d31fc 15707->15740 15711 7ff7285cd584 15712 7ff7285cd5d9 15711->15712 15713 7ff7285cd5a4 15711->15713 15716 7ff7285cd588 15711->15716 15793 7ff7285cd0c8 15712->15793 15789 7ff7285cd384 15713->15789 15716->15689 15718 7ff7285d31fc 38 API calls 15717->15718 15719 7ff7285cd2f6 15718->15719 15720 7ff7285d2c44 37 API calls 15719->15720 15721 7ff7285cd346 15720->15721 15722 7ff7285cd384 45 API calls 15721->15722 15723 7ff7285cd34a 15721->15723 15722->15723 15723->15689 15725 7ff7285d31fc 38 API calls 15724->15725 15726 7ff7285cd017 15725->15726 15727 7ff7285d2c44 37 API calls 15726->15727 15728 7ff7285cd06f 15727->15728 15729 7ff7285cd073 15728->15729 15730 7ff7285cd0c8 45 API calls 15728->15730 15729->15689 15730->15729 15732 7ff7285cccac 15731->15732 15733 7ff7285ccc79 15731->15733 15734 7ff7285cccc4 15732->15734 15738 7ff7285ccd45 15732->15738 15735 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15733->15735 15736 7ff7285ccfcc 46 API calls 15734->15736 15737 7ff7285ccca5 memcpy_s 15735->15737 15736->15737 15737->15689 15738->15737 15739 7ff7285c3a50 45 API calls 15738->15739 15739->15737 15741 7ff7285d324f fegetenv 15740->15741 15742 7ff7285d715c 37 API calls 15741->15742 15745 7ff7285d32a2 15742->15745 15743 7ff7285d3392 15746 7ff7285d715c 37 API calls 15743->15746 15744 7ff7285d32cf 15748 7ff7285c91dc __std_exception_copy 37 API calls 15744->15748 15745->15743 15749 7ff7285d336c 15745->15749 15750 7ff7285d32bd 15745->15750 15747 7ff7285d33bc 15746->15747 15751 7ff7285d715c 37 API calls 15747->15751 15752 7ff7285d334d 15748->15752 15753 7ff7285c91dc __std_exception_copy 37 API calls 15749->15753 15750->15743 15750->15744 15754 7ff7285d33cd 15751->15754 15755 7ff7285d4474 15752->15755 15760 7ff7285d3355 15752->15760 15753->15752 15757 7ff7285d7350 20 API calls 15754->15757 15756 7ff7285c9e00 _wfindfirst32i64 17 API calls 15755->15756 15758 7ff7285d4489 15756->15758 15767 7ff7285d3436 memcpy_s 15757->15767 15759 7ff7285badb0 _wfindfirst32i64 8 API calls 15761 7ff7285cd529 15759->15761 15760->15759 15785 7ff7285d2c44 15761->15785 15762 7ff7285d37df memcpy_s 15763 7ff7285d3b1f 15764 7ff7285d2d60 37 API calls 15763->15764 15771 7ff7285d4237 15764->15771 15765 7ff7285d3477 memcpy_s 15781 7ff7285d3dbb memcpy_s 15765->15781 15782 7ff7285d38d3 memcpy_s 15765->15782 15766 7ff7285d3acb 15766->15763 15768 7ff7285d448c memcpy_s 37 API calls 15766->15768 15767->15762 15767->15765 15769 7ff7285c4474 _findclose 11 API calls 15767->15769 15768->15763 15770 7ff7285d38b0 15769->15770 15772 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 15770->15772 15773 7ff7285d448c memcpy_s 37 API calls 15771->15773 15778 7ff7285d4292 15771->15778 15772->15765 15773->15778 15774 7ff7285d4418 15776 7ff7285d715c 37 API calls 15774->15776 15775 7ff7285c4474 11 API calls _findclose 15775->15781 15776->15760 15777 7ff7285c4474 11 API calls _findclose 15777->15782 15778->15774 15783 7ff7285d2d60 37 API calls 15778->15783 15784 7ff7285d448c memcpy_s 37 API calls 15778->15784 15779 7ff7285c9de0 37 API calls _invalid_parameter_noinfo 15779->15781 15780 7ff7285c9de0 37 API calls _invalid_parameter_noinfo 15780->15782 15781->15763 15781->15766 15781->15775 15781->15779 15782->15766 15782->15777 15782->15780 15783->15778 15784->15778 15786 7ff7285d2c63 15785->15786 15787 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15786->15787 15788 7ff7285d2c8e memcpy_s 15786->15788 15787->15788 15788->15711 15790 7ff7285cd3b0 memcpy_s 15789->15790 15791 7ff7285c3a50 45 API calls 15790->15791 15792 7ff7285cd46a memcpy_s 15790->15792 15791->15792 15792->15716 15794 7ff7285cd103 15793->15794 15797 7ff7285cd150 memcpy_s 15793->15797 15795 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15794->15795 15796 7ff7285cd12f 15795->15796 15796->15716 15798 7ff7285cd1bb 15797->15798 15800 7ff7285c3a50 45 API calls 15797->15800 15799 7ff7285c91dc __std_exception_copy 37 API calls 15798->15799 15803 7ff7285cd1fd memcpy_s 15799->15803 15800->15798 15801 7ff7285c9e00 _wfindfirst32i64 17 API calls 15802 7ff7285cd2a8 15801->15802 15803->15801 15806 7ff7285cf10c WideCharToMultiByte 15804->15806 15808 7ff7285bffd1 15807->15808 15809 7ff7285bffe3 15807->15809 15810 7ff7285c4474 _findclose 11 API calls 15808->15810 15812 7ff7285bfff0 15809->15812 15815 7ff7285c002d 15809->15815 15811 7ff7285bffd6 15810->15811 15813 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 15811->15813 15814 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15812->15814 15819 7ff7285bffe1 15813->15819 15814->15819 15816 7ff7285c00d6 15815->15816 15817 7ff7285c4474 _findclose 11 API calls 15815->15817 15818 7ff7285c4474 _findclose 11 API calls 15816->15818 15816->15819 15820 7ff7285c00cb 15817->15820 15821 7ff7285c0180 15818->15821 15819->15547 15823 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 15820->15823 15822 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 15821->15822 15822->15819 15823->15816 15825 7ff7285ccba9 15824->15825 15827 7ff7285c3a8f 15824->15827 15825->15827 15832 7ff7285d2454 15825->15832 15828 7ff7285ccbfc 15827->15828 15829 7ff7285ccc15 15828->15829 15830 7ff7285c3a9f 15828->15830 15829->15830 15876 7ff7285d17c0 15829->15876 15830->15547 15844 7ff7285ca650 GetLastError 15832->15844 15835 7ff7285d24ae 15835->15827 15845 7ff7285ca674 FlsGetValue 15844->15845 15846 7ff7285ca691 FlsSetValue 15844->15846 15847 7ff7285ca68b 15845->15847 15863 7ff7285ca681 15845->15863 15848 7ff7285ca6a3 15846->15848 15846->15863 15847->15846 15849 7ff7285cdd70 _findclose 11 API calls 15848->15849 15851 7ff7285ca6b2 15849->15851 15850 7ff7285ca6fd SetLastError 15852 7ff7285ca71d 15850->15852 15853 7ff7285ca70a 15850->15853 15854 7ff7285ca6d0 FlsSetValue 15851->15854 15855 7ff7285ca6c0 FlsSetValue 15851->15855 15867 7ff7285c923c 15852->15867 15853->15835 15866 7ff7285cf7b8 EnterCriticalSection 15853->15866 15859 7ff7285ca6dc FlsSetValue 15854->15859 15860 7ff7285ca6ee 15854->15860 15858 7ff7285ca6c9 15855->15858 15861 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15858->15861 15859->15858 15862 7ff7285ca3f4 _findclose 11 API calls 15860->15862 15861->15863 15864 7ff7285ca6f6 15862->15864 15863->15850 15865 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15864->15865 15865->15850 15868 7ff7285d27a0 __FrameHandler3::FrameUnwindToEmptyState EnterCriticalSection LeaveCriticalSection 15867->15868 15870 7ff7285c9245 15868->15870 15869 7ff7285c9254 15872 7ff7285c925d IsProcessorFeaturePresent 15869->15872 15873 7ff7285c9287 __FrameHandler3::FrameUnwindToEmptyState 15869->15873 15870->15869 15871 7ff7285d27f0 __FrameHandler3::FrameUnwindToEmptyState 44 API calls 15870->15871 15871->15869 15874 7ff7285c926c 15872->15874 15875 7ff7285c9b14 _wfindfirst32i64 14 API calls 15874->15875 15875->15873 15877 7ff7285ca650 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 15876->15877 15878 7ff7285d17c9 15877->15878 15886 7ff7285c431c EnterCriticalSection 15879->15886 15888 7ff7285b24ec 15887->15888 15889 7ff7285c3c14 49 API calls 15888->15889 15890 7ff7285b253d 15889->15890 15891 7ff7285c4474 _findclose 11 API calls 15890->15891 15892 7ff7285b2542 15891->15892 15906 7ff7285c4494 15892->15906 15895 7ff7285b1b30 49 API calls 15896 7ff7285b2571 memcpy_s 15895->15896 15897 7ff7285b7a60 57 API calls 15896->15897 15898 7ff7285b25a6 15897->15898 15899 7ff7285b25e3 MessageBoxA 15898->15899 15900 7ff7285b25ab 15898->15900 15902 7ff7285b25fd 15899->15902 15901 7ff7285b7a60 57 API calls 15900->15901 15903 7ff7285b25c5 MessageBoxW 15901->15903 15904 7ff7285badb0 _wfindfirst32i64 8 API calls 15902->15904 15903->15902 15905 7ff7285b260d 15904->15905 15905->15233 15907 7ff7285ca7c8 _findclose 11 API calls 15906->15907 15908 7ff7285c44ab 15907->15908 15909 7ff7285b2549 15908->15909 15910 7ff7285cdd70 _findclose 11 API calls 15908->15910 15913 7ff7285c44eb 15908->15913 15909->15895 15911 7ff7285c44e0 15910->15911 15912 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15911->15912 15912->15913 15913->15909 15918 7ff7285ce448 15913->15918 15916 7ff7285c9e00 _wfindfirst32i64 17 API calls 15917 7ff7285c4530 15916->15917 15921 7ff7285ce465 15918->15921 15919 7ff7285ce46a 15920 7ff7285c4474 _findclose 11 API calls 15919->15920 15922 7ff7285c4511 15919->15922 15923 7ff7285ce474 15920->15923 15921->15919 15921->15922 15925 7ff7285ce4b4 15921->15925 15922->15909 15922->15916 15924 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 15923->15924 15924->15922 15925->15922 15926 7ff7285c4474 _findclose 11 API calls 15925->15926 15926->15923 15928 7ff7285b7c02 WideCharToMultiByte 15927->15928 15929 7ff7285b7b94 WideCharToMultiByte 15927->15929 15930 7ff7285b7c2f 15928->15930 15934 7ff7285b3c25 15928->15934 15931 7ff7285b7bd5 15929->15931 15932 7ff7285b7bbe 15929->15932 15933 7ff7285b2620 57 API calls 15930->15933 15931->15928 15936 7ff7285b7beb 15931->15936 15935 7ff7285b2620 57 API calls 15932->15935 15933->15934 15934->15243 15934->15244 15935->15934 15937 7ff7285b2620 57 API calls 15936->15937 15937->15934 15939 7ff7285b6a2e 15938->15939 15940 7ff7285c9153 15938->15940 15939->15263 15940->15939 15941 7ff7285c91dc __std_exception_copy 37 API calls 15940->15941 15942 7ff7285c9180 15941->15942 15942->15939 15943 7ff7285c9e00 _wfindfirst32i64 17 API calls 15942->15943 15944 7ff7285c91b0 15943->15944 15946 7ff7285b17e4 15945->15946 15947 7ff7285b17d4 15945->15947 15949 7ff7285b7230 83 API calls 15946->15949 15951 7ff7285b1842 15946->15951 15948 7ff7285b3cd0 116 API calls 15947->15948 15948->15946 15950 7ff7285b1815 15949->15950 15950->15951 15979 7ff7285bf964 15950->15979 15953 7ff7285badb0 _wfindfirst32i64 8 API calls 15951->15953 15955 7ff7285b19c0 15953->15955 15954 7ff7285b182b 15956 7ff7285b182f 15954->15956 15957 7ff7285b184c 15954->15957 15955->15278 15955->15279 15959 7ff7285b24d0 59 API calls 15956->15959 15983 7ff7285bf62c 15957->15983 15959->15951 15961 7ff7285b1867 15963 7ff7285b24d0 59 API calls 15961->15963 15962 7ff7285bf964 73 API calls 15964 7ff7285b18d1 15962->15964 15963->15951 15965 7ff7285b18e3 15964->15965 15966 7ff7285b18fe 15964->15966 15968 7ff7285b24d0 59 API calls 15965->15968 15967 7ff7285bf62c _fread_nolock 53 API calls 15966->15967 15969 7ff7285b1913 15967->15969 15968->15951 15969->15961 15970 7ff7285b1925 15969->15970 15986 7ff7285bf3a0 15970->15986 15973 7ff7285b193d 15974 7ff7285b2770 59 API calls 15973->15974 15974->15951 15975 7ff7285b1993 15975->15951 15976 7ff7285bf2dc 74 API calls 15975->15976 15976->15951 15977 7ff7285b1950 15977->15975 15978 7ff7285b2770 59 API calls 15977->15978 15978->15975 15980 7ff7285bf994 15979->15980 15992 7ff7285bf6f4 15980->15992 15982 7ff7285bf9ad 15982->15954 16004 7ff7285bf64c 15983->16004 15987 7ff7285bf3a9 15986->15987 15988 7ff7285b1939 15986->15988 15989 7ff7285c4474 _findclose 11 API calls 15987->15989 15988->15973 15988->15977 15990 7ff7285bf3ae 15989->15990 15991 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 15990->15991 15991->15988 15993 7ff7285bf75e 15992->15993 15994 7ff7285bf71e 15992->15994 15993->15994 15996 7ff7285bf76a 15993->15996 15995 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 15994->15995 16002 7ff7285bf745 15995->16002 16003 7ff7285c431c EnterCriticalSection 15996->16003 16002->15982 16005 7ff7285bf676 16004->16005 16006 7ff7285b1861 16004->16006 16005->16006 16007 7ff7285bf6c2 16005->16007 16008 7ff7285bf685 memcpy_s 16005->16008 16006->15961 16006->15962 16017 7ff7285c431c EnterCriticalSection 16007->16017 16010 7ff7285c4474 _findclose 11 API calls 16008->16010 16012 7ff7285bf69a 16010->16012 16014 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 16012->16014 16014->16006 16111 7ff7285b6740 16018->16111 16020 7ff7285b1454 16021 7ff7285b1459 16020->16021 16120 7ff7285b6a60 16020->16120 16021->15290 16024 7ff7285b14a7 16026 7ff7285b14e0 16024->16026 16028 7ff7285b3cd0 116 API calls 16024->16028 16025 7ff7285b1487 16027 7ff7285b24d0 59 API calls 16025->16027 16029 7ff7285bf964 73 API calls 16026->16029 16030 7ff7285b149d 16027->16030 16031 7ff7285b14bf 16028->16031 16032 7ff7285b14f2 16029->16032 16030->15290 16031->16026 16033 7ff7285b14c7 16031->16033 16034 7ff7285b1516 16032->16034 16035 7ff7285b14f6 16032->16035 16036 7ff7285b2770 59 API calls 16033->16036 16038 7ff7285b1534 16034->16038 16039 7ff7285b151c 16034->16039 16037 7ff7285b24d0 59 API calls 16035->16037 16046 7ff7285b14d6 __vcrt_freefls 16036->16046 16037->16046 16041 7ff7285b1556 16038->16041 16051 7ff7285b1575 16038->16051 16145 7ff7285b1050 16039->16145 16043 7ff7285b24d0 59 API calls 16041->16043 16042 7ff7285b1624 16045 7ff7285bf2dc 74 API calls 16042->16045 16043->16046 16044 7ff7285bf2dc 74 API calls 16044->16042 16045->16030 16046->16042 16046->16044 16047 7ff7285bf62c _fread_nolock 53 API calls 16047->16051 16048 7ff7285b15d5 16050 7ff7285b24d0 59 API calls 16048->16050 16050->16046 16051->16046 16051->16047 16051->16048 16163 7ff7285bfd6c 16051->16163 16053 7ff7285b29c6 16052->16053 16054 7ff7285b1b30 49 API calls 16053->16054 16056 7ff7285b29fb 16054->16056 16055 7ff7285b2e01 16056->16055 16057 7ff7285b3b40 49 API calls 16056->16057 16058 7ff7285b2a6f 16057->16058 16732 7ff7285b2e20 16058->16732 16061 7ff7285b2ab1 16064 7ff7285b6740 98 API calls 16061->16064 16062 7ff7285b2aea 16063 7ff7285b2e20 75 API calls 16062->16063 16065 7ff7285b2b3c 16063->16065 16066 7ff7285b2ab9 16064->16066 16067 7ff7285b2b40 16065->16067 16068 7ff7285b2ba6 16065->16068 16069 7ff7285b2ada 16066->16069 16740 7ff7285b6620 16066->16740 16072 7ff7285b6740 98 API calls 16067->16072 16071 7ff7285b2e20 75 API calls 16068->16071 16073 7ff7285b2770 59 API calls 16069->16073 16076 7ff7285b2ae3 16069->16076 16074 7ff7285b2bd2 16071->16074 16075 7ff7285b2b48 16072->16075 16073->16076 16078 7ff7285b2e20 75 API calls 16074->16078 16087 7ff7285b2c32 16074->16087 16075->16069 16079 7ff7285b6620 138 API calls 16075->16079 16077 7ff7285badb0 _wfindfirst32i64 8 API calls 16076->16077 16081 7ff7285b2b9b 16077->16081 16082 7ff7285b2c02 16078->16082 16083 7ff7285b2b65 16079->16083 16080 7ff7285b6740 98 API calls 16084 7ff7285b2c42 16080->16084 16081->15290 16082->16087 16083->16069 16084->16055 16087->16055 16087->16080 16108 7ff7285b17a1 16107->16108 16109 7ff7285b1795 16107->16109 16108->15290 16110 7ff7285b2770 59 API calls 16109->16110 16110->16108 16112 7ff7285b6752 16111->16112 16117 7ff7285b6788 16111->16117 16167 7ff7285b16d0 16112->16167 16117->16020 16121 7ff7285b6a70 16120->16121 16122 7ff7285b1b30 49 API calls 16121->16122 16123 7ff7285b6aa1 16122->16123 16124 7ff7285b6c70 16123->16124 16125 7ff7285b1b30 49 API calls 16123->16125 16126 7ff7285badb0 _wfindfirst32i64 8 API calls 16124->16126 16128 7ff7285b6ac8 16125->16128 16127 7ff7285b147f 16126->16127 16127->16024 16127->16025 16128->16124 16682 7ff7285c5118 16128->16682 16130 7ff7285b6bd9 16131 7ff7285b7a60 57 API calls 16130->16131 16133 7ff7285b6bf1 16131->16133 16132 7ff7285b6cab 16134 7ff7285b3cd0 116 API calls 16132->16134 16133->16132 16137 7ff7285b69b0 61 API calls 16133->16137 16141 7ff7285b6c22 __vcrt_freefls 16133->16141 16134->16124 16135 7ff7285b6c5f 16136 7ff7285b6c93 16137->16141 16139 7ff7285b6afd 16139->16124 16139->16130 16142 7ff7285c5118 49 API calls 16139->16142 16143 7ff7285b7a60 57 API calls 16139->16143 16144 7ff7285b78d0 58 API calls 16139->16144 16141->16135 16141->16136 16142->16139 16143->16139 16144->16139 16146 7ff7285b10a6 16145->16146 16147 7ff7285b10d3 16146->16147 16148 7ff7285b10ad 16146->16148 16151 7ff7285b1109 16147->16151 16152 7ff7285b10ed 16147->16152 16149 7ff7285b2770 59 API calls 16148->16149 16150 7ff7285b10c0 16149->16150 16150->16046 16154 7ff7285b1137 memcpy_s 16151->16154 16155 7ff7285b111b 16151->16155 16153 7ff7285b24d0 59 API calls 16152->16153 16164 7ff7285bfd9c 16163->16164 16717 7ff7285bfabc 16164->16717 16169 7ff7285b16f5 16167->16169 16168 7ff7285b1738 16171 7ff7285b67a0 16168->16171 16169->16168 16170 7ff7285b2770 59 API calls 16169->16170 16170->16168 16172 7ff7285b67b6 16171->16172 16173 7ff7285b67da 16172->16173 16174 7ff7285b682d GetTempPathW 16172->16174 16175 7ff7285b69b0 61 API calls 16173->16175 16176 7ff7285b6842 16174->16176 16177 7ff7285b67e6 16175->16177 16210 7ff7285b2470 16176->16210 16234 7ff7285b64a0 16177->16234 16183 7ff7285badb0 _wfindfirst32i64 8 API calls 16187 7ff7285b685b __vcrt_freefls 16188 7ff7285b6906 16187->16188 16193 7ff7285b6891 16187->16193 16214 7ff7285c739c 16187->16214 16217 7ff7285b78d0 16187->16217 16191 7ff7285b7b70 59 API calls 16188->16191 16195 7ff7285b7a60 57 API calls 16193->16195 16209 7ff7285b68ca __vcrt_freefls 16193->16209 16209->16183 16211 7ff7285b2495 16210->16211 16268 7ff7285c3e68 16211->16268 16235 7ff7285b64ac 16234->16235 16236 7ff7285b7a60 57 API calls 16235->16236 16237 7ff7285b64ce 16236->16237 16238 7ff7285b64d6 16237->16238 16239 7ff7285b64e9 ExpandEnvironmentStringsW 16237->16239 16240 7ff7285b2770 59 API calls 16238->16240 16241 7ff7285b650f __vcrt_freefls 16239->16241 16246 7ff7285b64e2 16240->16246 16242 7ff7285b6526 16241->16242 16243 7ff7285b6513 16241->16243 16248 7ff7285b6540 16242->16248 16249 7ff7285b6534 16242->16249 16244 7ff7285b2770 59 API calls 16243->16244 16244->16246 16245 7ff7285badb0 _wfindfirst32i64 8 API calls 16247 7ff7285b6608 16245->16247 16246->16245 16247->16209 16258 7ff7285c66e4 16247->16258 16582 7ff7285c5378 16248->16582 16575 7ff7285c5f74 16249->16575 16252 7ff7285b653e 16259 7ff7285c66f1 16258->16259 16260 7ff7285c6704 16258->16260 16269 7ff7285c3ec2 16268->16269 16270 7ff7285c3ee7 16269->16270 16272 7ff7285c3f23 16269->16272 16271 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 16270->16271 16275 7ff7285c3f11 16271->16275 16286 7ff7285c2220 16272->16286 16276 7ff7285badb0 _wfindfirst32i64 8 API calls 16275->16276 16278 7ff7285b24b4 16276->16278 16277 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16277->16275 16278->16187 16279 7ff7285c4004 16279->16277 16280 7ff7285c402a 16280->16279 16282 7ff7285c4034 16280->16282 16281 7ff7285c3fd9 16283 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16281->16283 16285 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16282->16285 16283->16275 16284 7ff7285c3fd0 16284->16279 16284->16281 16285->16275 16287 7ff7285c225e 16286->16287 16288 7ff7285c224e 16286->16288 16289 7ff7285c2267 16287->16289 16293 7ff7285c2295 16287->16293 16290 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 16288->16290 16291 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 16289->16291 16292 7ff7285c228d 16290->16292 16291->16292 16292->16279 16292->16280 16292->16281 16292->16284 16293->16288 16293->16292 16297 7ff7285c2c34 16293->16297 16330 7ff7285c2680 16293->16330 16367 7ff7285c1e10 16293->16367 16298 7ff7285c2c76 16297->16298 16299 7ff7285c2ce7 16297->16299 16300 7ff7285c2d11 16298->16300 16301 7ff7285c2c7c 16298->16301 16302 7ff7285c2d40 16299->16302 16303 7ff7285c2cec 16299->16303 16386 7ff7285c0fe4 16300->16386 16304 7ff7285c2c81 16301->16304 16305 7ff7285c2cb0 16301->16305 16308 7ff7285c2d4a 16302->16308 16309 7ff7285c2d57 16302->16309 16314 7ff7285c2d4f 16302->16314 16306 7ff7285c2d21 16303->16306 16307 7ff7285c2cee 16303->16307 16304->16309 16305->16314 16308->16300 16308->16314 16331 7ff7285c26a4 16330->16331 16332 7ff7285c268e 16330->16332 16335 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 16331->16335 16338 7ff7285c26e4 16331->16338 16333 7ff7285c2c76 16332->16333 16334 7ff7285c2ce7 16332->16334 16332->16338 16336 7ff7285c2d11 16333->16336 16337 7ff7285c2c7c 16333->16337 16339 7ff7285c2d40 16334->16339 16340 7ff7285c2cec 16334->16340 16335->16338 16338->16293 16423 7ff7285c0258 16367->16423 16424 7ff7285c029f 16423->16424 16425 7ff7285c028d 16423->16425 16428 7ff7285c02ad 16424->16428 16432 7ff7285c02e9 16424->16432 16426 7ff7285c4474 _findclose 11 API calls 16425->16426 16576 7ff7285c5fc5 16575->16576 16577 7ff7285c5f92 16575->16577 16576->16252 16577->16576 16578 7ff7285cf954 _wfindfirst32i64 37 API calls 16577->16578 16583 7ff7285c5402 16582->16583 16584 7ff7285c5394 16582->16584 16619 7ff7285cf0c0 16583->16619 16584->16583 16586 7ff7285c5399 16584->16586 16683 7ff7285ca650 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 16682->16683 16684 7ff7285c512d 16683->16684 16685 7ff7285ceec7 16684->16685 16688 7ff7285cede6 16684->16688 16704 7ff7285baf44 16685->16704 16689 7ff7285badb0 _wfindfirst32i64 8 API calls 16688->16689 16690 7ff7285ceebf 16689->16690 16690->16139 16707 7ff7285baf58 IsProcessorFeaturePresent 16704->16707 16708 7ff7285baf6f 16707->16708 16713 7ff7285baff4 RtlCaptureContext RtlLookupFunctionEntry 16708->16713 16714 7ff7285baf83 16713->16714 16715 7ff7285bb024 RtlVirtualUnwind 16713->16715 16716 7ff7285bae30 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16714->16716 16715->16714 16718 7ff7285bfadc 16717->16718 16723 7ff7285bfb09 16717->16723 16718->16723 16733 7ff7285b2e54 16732->16733 16734 7ff7285c3c14 49 API calls 16733->16734 16735 7ff7285b2e7a 16734->16735 16736 7ff7285b2e8b 16735->16736 16764 7ff7285c4e38 16735->16764 16738 7ff7285badb0 _wfindfirst32i64 8 API calls 16736->16738 16739 7ff7285b2aad 16738->16739 16739->16061 16739->16062 16741 7ff7285b662e 16740->16741 16742 7ff7285b3cd0 116 API calls 16741->16742 16743 7ff7285b6655 16742->16743 16744 7ff7285b6a60 136 API calls 16743->16744 16765 7ff7285c4e61 16764->16765 16766 7ff7285c4e55 16764->16766 16806 7ff7285c4a4c 16765->16806 16781 7ff7285c46b0 16766->16781 16771 7ff7285c4e99 16817 7ff7285c4534 16771->16817 16774 7ff7285c4ef5 16777 7ff7285c4e5a 16774->16777 16779 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16774->16779 16775 7ff7285c4f09 16776 7ff7285c46b0 69 API calls 16775->16776 16778 7ff7285c4f15 16776->16778 16777->16736 16778->16777 16780 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16778->16780 16779->16777 16780->16777 16782 7ff7285c46ca 16781->16782 16783 7ff7285c46e7 16781->16783 16784 7ff7285c4454 _fread_nolock 11 API calls 16782->16784 16783->16782 16785 7ff7285c46fa CreateFileW 16783->16785 16786 7ff7285c46cf 16784->16786 16787 7ff7285c4764 16785->16787 16788 7ff7285c472e 16785->16788 16790 7ff7285c4474 _findclose 11 API calls 16786->16790 16865 7ff7285c4d28 16787->16865 16839 7ff7285c4804 GetFileType 16788->16839 16793 7ff7285c46d7 16790->16793 16797 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 16793->16797 16801 7ff7285c46e2 16797->16801 16801->16777 16807 7ff7285c4a70 16806->16807 16813 7ff7285c4a6b 16806->16813 16808 7ff7285ca650 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 16807->16808 16807->16813 16809 7ff7285c4a8b 16808->16809 16927 7ff7285ccb5c 16809->16927 16813->16771 16814 7ff7285cdffc 16813->16814 16935 7ff7285cdde8 16814->16935 16818 7ff7285c4582 16817->16818 16819 7ff7285c455e 16817->16819 16820 7ff7285c4587 16818->16820 16821 7ff7285c45dc 16818->16821 16823 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16819->16823 16824 7ff7285c456d 16819->16824 16820->16824 16825 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16820->16825 16830 7ff7285c459c 16820->16830 16944 7ff7285ce820 16821->16944 16823->16824 16824->16774 16824->16775 16825->16830 16826 7ff7285ccafc _fread_nolock 12 API calls 16826->16824 16830->16826 16840 7ff7285c4852 16839->16840 16841 7ff7285c490f 16839->16841 16844 7ff7285c487e GetFileInformationByHandle 16840->16844 16845 7ff7285c4c24 21 API calls 16840->16845 16842 7ff7285c4939 16841->16842 16843 7ff7285c4917 16841->16843 16849 7ff7285c495c PeekNamedPipe 16842->16849 16864 7ff7285c48fa 16842->16864 16846 7ff7285c492a GetLastError 16843->16846 16847 7ff7285c491b 16843->16847 16844->16846 16848 7ff7285c48a7 16844->16848 16850 7ff7285c486c 16845->16850 16853 7ff7285c43e8 _fread_nolock 11 API calls 16846->16853 16851 7ff7285c4474 _findclose 11 API calls 16847->16851 16852 7ff7285c4ae8 51 API calls 16848->16852 16849->16864 16850->16844 16850->16864 16851->16864 16853->16864 16854 7ff7285badb0 _wfindfirst32i64 8 API calls 16864->16854 16866 7ff7285c4d5e 16865->16866 16867 7ff7285c4474 _findclose 11 API calls 16866->16867 16885 7ff7285c4df6 __vcrt_freefls 16866->16885 16869 7ff7285c4d70 16867->16869 16868 7ff7285badb0 _wfindfirst32i64 8 API calls 16870 7ff7285c4769 16868->16870 16871 7ff7285c4474 _findclose 11 API calls 16869->16871 16885->16868 16928 7ff7285ccb71 16927->16928 16929 7ff7285c4aae 16927->16929 16928->16929 16930 7ff7285d2454 45 API calls 16928->16930 16931 7ff7285ccbc8 16929->16931 16930->16929 16932 7ff7285ccbdd 16931->16932 16934 7ff7285ccbf0 16931->16934 16933 7ff7285d17c0 45 API calls 16932->16933 16932->16934 16933->16934 16934->16813 16936 7ff7285cde45 16935->16936 16942 7ff7285cde40 __vcrt_InitializeCriticalSectionEx 16935->16942 16936->16771 16937 7ff7285cde75 LoadLibraryExW 16939 7ff7285cdf4a 16937->16939 16940 7ff7285cde9a GetLastError 16937->16940 16938 7ff7285cdf6a GetProcAddress 16938->16936 16939->16938 16941 7ff7285cdf61 FreeLibrary 16939->16941 16940->16942 16941->16938 16942->16936 16942->16937 16942->16938 16943 7ff7285cded4 LoadLibraryExW 16942->16943 16943->16939 16943->16942 16945 7ff7285ce829 MultiByteToWideChar 16944->16945 16974 7ff7285b70aa 16973->16974 16975 7ff7285c91bd 16973->16975 16979 7ff7285c6f28 16974->16979 16976 7ff7285c4474 _findclose 11 API calls 16975->16976 16977 7ff7285c91c2 16976->16977 16992 7ff7285c542c 16991->16992 16993 7ff7285c5452 16992->16993 16996 7ff7285c5485 16992->16996 16994 7ff7285c4474 _findclose 11 API calls 16993->16994 16995 7ff7285c5457 16994->16995 16997 7ff7285c9de0 _invalid_parameter_noinfo 37 API calls 16995->16997 16998 7ff7285c5498 16996->16998 16999 7ff7285c548b 16996->16999 17003 7ff7285b3d29 16997->17003 17010 7ff7285ca128 16998->17010 17000 7ff7285c4474 _findclose 11 API calls 16999->17000 17000->17003 17003->15345 17023 7ff7285cf7b8 EnterCriticalSection 17010->17023 17371 7ff7285c7998 17370->17371 17374 7ff7285c7474 17371->17374 17373 7ff7285c79b1 17373->15353 17375 7ff7285c748f 17374->17375 17376 7ff7285c74be 17374->17376 17377 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 17375->17377 17384 7ff7285c431c EnterCriticalSection 17376->17384 17379 7ff7285c74af 17377->17379 17379->17373 17386 7ff7285bf101 17385->17386 17387 7ff7285bf0d3 17385->17387 17389 7ff7285bf0f3 17386->17389 17395 7ff7285c431c EnterCriticalSection 17386->17395 17388 7ff7285c9d14 _invalid_parameter_noinfo 37 API calls 17387->17388 17388->17389 17389->15359 17397 7ff7285b12c6 17396->17397 17398 7ff7285b12f8 17396->17398 17399 7ff7285b3cd0 116 API calls 17397->17399 17400 7ff7285bf964 73 API calls 17398->17400 17401 7ff7285b12d6 17399->17401 17402 7ff7285b130a 17400->17402 17401->17398 17403 7ff7285b12de 17401->17403 17404 7ff7285b132f 17402->17404 17405 7ff7285b130e 17402->17405 17406 7ff7285b2770 59 API calls 17403->17406 17410 7ff7285b1364 17404->17410 17411 7ff7285b1344 17404->17411 17407 7ff7285b24d0 59 API calls 17405->17407 17408 7ff7285b12ee 17406->17408 17409 7ff7285b1325 17407->17409 17408->15383 17409->15383 17412 7ff7285b137e 17410->17412 17418 7ff7285b1395 17410->17418 17413 7ff7285b24d0 59 API calls 17411->17413 17414 7ff7285b1050 98 API calls 17412->17414 17419 7ff7285b135f __vcrt_freefls 17413->17419 17414->17419 17415 7ff7285b1421 17415->15383 17416 7ff7285bf62c _fread_nolock 53 API calls 17416->17418 17417 7ff7285bf2dc 74 API calls 17417->17415 17418->17416 17418->17419 17420 7ff7285b13de 17418->17420 17419->17415 17419->17417 17421 7ff7285b24d0 59 API calls 17420->17421 17421->17419 17423 7ff7285b1b30 49 API calls 17422->17423 17424 7ff7285b3d80 17423->17424 17424->15385 17426 7ff7285b1669 17425->17426 17427 7ff7285b16ab 17425->17427 17426->17427 17428 7ff7285b2770 59 API calls 17426->17428 17427->15402 17429 7ff7285b16bf 17428->17429 17429->15402 17431 7ff7285b7a60 57 API calls 17430->17431 17432 7ff7285b71f7 LoadLibraryExW 17431->17432 17433 7ff7285b7214 __vcrt_freefls 17432->17433 17433->15410 17435 7ff7285b5f99 17434->17435 17436 7ff7285b5fbc GetProcAddress 17434->17436 17439 7ff7285b2620 57 API calls 17435->17439 17436->17435 17437 7ff7285b5fe1 GetProcAddress 17436->17437 17437->17435 17438 7ff7285b6006 GetProcAddress 17437->17438 17438->17435 17440 7ff7285b602e GetProcAddress 17438->17440 17441 7ff7285b5fac 17439->17441 17440->17435 17442 7ff7285b6056 GetProcAddress 17440->17442 17441->15417 17442->17435 17493->15425 17494->15428 17496 7ff7285b4990 17495->17496 17497 7ff7285b1b30 49 API calls 17496->17497 17498 7ff7285b49c2 17497->17498 17499 7ff7285b49eb 17498->17499 17500 7ff7285b49cb 17498->17500 17501 7ff7285b4a42 17499->17501 17503 7ff7285b3d50 49 API calls 17499->17503 17502 7ff7285b2770 59 API calls 17500->17502 17504 7ff7285b3d50 49 API calls 17501->17504 17505 7ff7285b49e1 17502->17505 17506 7ff7285b4a0c 17503->17506 17507 7ff7285b4a5b 17504->17507 17509 7ff7285badb0 _wfindfirst32i64 8 API calls 17505->17509 17508 7ff7285b4a2a 17506->17508 17512 7ff7285b2770 59 API calls 17506->17512 17510 7ff7285b4a79 17507->17510 17515 7ff7285b2770 59 API calls 17507->17515 17580 7ff7285b3c60 17508->17580 17514 7ff7285b30de 17509->17514 17511 7ff7285b71e0 58 API calls 17510->17511 17516 7ff7285b4a86 17511->17516 17512->17508 17514->15437 17523 7ff7285b4d00 17514->17523 17515->17510 17518 7ff7285b4aad 17516->17518 17519 7ff7285b4a8b 17516->17519 17586 7ff7285b3e10 GetProcAddress 17518->17586 17520 7ff7285b2620 57 API calls 17519->17520 17520->17505 17522 7ff7285b71e0 58 API calls 17522->17501 17524 7ff7285b69b0 61 API calls 17523->17524 17527 7ff7285b4d15 17524->17527 17525 7ff7285b4d30 17526 7ff7285b7a60 57 API calls 17525->17526 17528 7ff7285b4d74 17526->17528 17527->17525 17529 7ff7285b2890 59 API calls 17527->17529 17530 7ff7285b4d90 17528->17530 17531 7ff7285b4d79 17528->17531 17529->17525 17534 7ff7285b7a60 57 API calls 17530->17534 17532 7ff7285b2770 59 API calls 17531->17532 17533 7ff7285b4d85 17532->17533 17533->15439 17535 7ff7285b4dc5 17534->17535 17538 7ff7285b1b30 49 API calls 17535->17538 17549 7ff7285b4dca __vcrt_freefls 17535->17549 17536 7ff7285b2770 59 API calls 17537 7ff7285b4f71 17536->17537 17537->15439 17539 7ff7285b4e47 17538->17539 17540 7ff7285b4e73 17539->17540 17541 7ff7285b4e4e 17539->17541 17543 7ff7285b7a60 57 API calls 17540->17543 17542 7ff7285b2770 59 API calls 17541->17542 17549->17536 17550 7ff7285b4f5a 17549->17550 17550->15439 17552 7ff7285b4717 17551->17552 17552->17552 17553 7ff7285b4740 17552->17553 17560 7ff7285b4757 __vcrt_freefls 17552->17560 17581 7ff7285b3c6a 17580->17581 17582 7ff7285b7a60 57 API calls 17581->17582 17583 7ff7285b3c92 17582->17583 17584 7ff7285badb0 _wfindfirst32i64 8 API calls 17583->17584 17585 7ff7285b3cba 17584->17585 17585->17501 17585->17522 17587 7ff7285b3e38 17586->17587 17588 7ff7285b3e5b GetProcAddress 17586->17588 17590 7ff7285b2620 57 API calls 17587->17590 17588->17587 17589 7ff7285b3e80 GetProcAddress 17588->17589 17589->17587 17591 7ff7285b3ea5 GetProcAddress 17589->17591 17593 7ff7285b3e4b 17590->17593 17591->17587 17592 7ff7285b3ecd GetProcAddress 17591->17592 17592->17587 17594 7ff7285b3ef5 GetProcAddress 17592->17594 17593->17505 17594->17587 17595 7ff7285b3f1d GetProcAddress 17594->17595 17596 7ff7285b3f45 GetProcAddress 17595->17596 17597 7ff7285b3f39 17595->17597 17598 7ff7285b3f61 17596->17598 17599 7ff7285b3f6d GetProcAddress 17596->17599 17597->17596 17598->17599 17600 7ff7285b3f89 17599->17600 17861 7ff7285ca650 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 17860->17861 17862 7ff7285c9111 17861->17862 17863 7ff7285c923c __FrameHandler3::FrameUnwindToEmptyState 45 API calls 17862->17863 17864 7ff7285c9131 17863->17864 14896 7ff7285ba3a0 14897 7ff7285ba3b5 14896->14897 14898 7ff7285ba3ce 14896->14898 14897->14898 14900 7ff7285ccafc 12 API calls 14897->14900 14899 7ff7285ba42c 14900->14899 18947 7ff7285d0820 18958 7ff7285d6794 18947->18958 18959 7ff7285d67a1 18958->18959 18960 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18959->18960 18961 7ff7285d67bd 18959->18961 18960->18959 18962 7ff7285c9e48 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18961->18962 18963 7ff7285d0829 18961->18963 18962->18961 18964 7ff7285cf7b8 EnterCriticalSection 18963->18964 18986 7ff7285d9729 18987 7ff7285d9742 18986->18987 18988 7ff7285d9738 18986->18988 18990 7ff7285cf818 LeaveCriticalSection 18988->18990

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 135 7ff7285d4e50-7ff7285d4e8b call 7ff7285d47d8 call 7ff7285d47e0 call 7ff7285d4848 142 7ff7285d50b5-7ff7285d5101 call 7ff7285c9e00 call 7ff7285d47d8 call 7ff7285d47e0 call 7ff7285d4848 135->142 143 7ff7285d4e91-7ff7285d4e9c call 7ff7285d47e8 135->143 169 7ff7285d523f-7ff7285d52ad call 7ff7285c9e00 call 7ff7285d06e8 142->169 170 7ff7285d5107-7ff7285d5112 call 7ff7285d47e8 142->170 143->142 148 7ff7285d4ea2-7ff7285d4eac 143->148 151 7ff7285d4ece-7ff7285d4ed2 148->151 152 7ff7285d4eae-7ff7285d4eb1 148->152 155 7ff7285d4ed5-7ff7285d4edd 151->155 154 7ff7285d4eb4-7ff7285d4ebf 152->154 157 7ff7285d4ec1-7ff7285d4ec8 154->157 158 7ff7285d4eca-7ff7285d4ecc 154->158 155->155 159 7ff7285d4edf-7ff7285d4ef2 call 7ff7285ccafc 155->159 157->154 157->158 158->151 161 7ff7285d4efb-7ff7285d4f09 158->161 165 7ff7285d4ef4-7ff7285d4ef6 call 7ff7285c9e48 159->165 166 7ff7285d4f0a-7ff7285d4f16 call 7ff7285c9e48 159->166 165->161 176 7ff7285d4f1d-7ff7285d4f25 166->176 187 7ff7285d52af-7ff7285d52b6 169->187 188 7ff7285d52bb-7ff7285d52be 169->188 170->169 178 7ff7285d5118-7ff7285d5123 call 7ff7285d4818 170->178 176->176 179 7ff7285d4f27-7ff7285d4f38 call 7ff7285cf954 176->179 178->169 189 7ff7285d5129-7ff7285d514c call 7ff7285c9e48 GetTimeZoneInformation 178->189 179->142 190 7ff7285d4f3e-7ff7285d4f94 call 7ff7285bc240 * 4 call 7ff7285d4d6c 179->190 191 7ff7285d534b-7ff7285d534e 187->191 192 7ff7285d52f5-7ff7285d5308 call 7ff7285ccafc 188->192 193 7ff7285d52c0 188->193 205 7ff7285d5214-7ff7285d523e call 7ff7285d47d0 call 7ff7285d47c0 call 7ff7285d47c8 189->205 206 7ff7285d5152-7ff7285d5173 189->206 247 7ff7285d4f96-7ff7285d4f9a 190->247 197 7ff7285d52c3 call 7ff7285d50cc 191->197 198 7ff7285d5354-7ff7285d535c call 7ff7285d4e50 191->198 213 7ff7285d5313-7ff7285d532e call 7ff7285d06e8 192->213 214 7ff7285d530a 192->214 193->197 211 7ff7285d52c8-7ff7285d52f4 call 7ff7285c9e48 call 7ff7285badb0 197->211 198->211 207 7ff7285d5175-7ff7285d517b 206->207 208 7ff7285d517e-7ff7285d5185 206->208 207->208 216 7ff7285d5187-7ff7285d518f 208->216 217 7ff7285d5199 208->217 232 7ff7285d5335-7ff7285d5347 call 7ff7285c9e48 213->232 233 7ff7285d5330-7ff7285d5333 213->233 215 7ff7285d530c-7ff7285d5311 call 7ff7285c9e48 214->215 215->193 216->217 223 7ff7285d5191-7ff7285d5197 216->223 225 7ff7285d519b-7ff7285d520f call 7ff7285bc240 * 4 call 7ff7285d1cac call 7ff7285d5364 * 2 217->225 223->225 225->205 232->191 233->215 249 7ff7285d4fa0-7ff7285d4fa4 247->249 250 7ff7285d4f9c 247->250 249->247 252 7ff7285d4fa6-7ff7285d4fcb call 7ff7285d7c94 249->252 250->249 258 7ff7285d4fce-7ff7285d4fd2 252->258 260 7ff7285d4fd4-7ff7285d4fdf 258->260 261 7ff7285d4fe1-7ff7285d4fe5 258->261 260->261 263 7ff7285d4fe7-7ff7285d4feb 260->263 261->258 266 7ff7285d506c-7ff7285d5070 263->266 267 7ff7285d4fed-7ff7285d5015 call 7ff7285d7c94 263->267 268 7ff7285d5072-7ff7285d5074 266->268 269 7ff7285d5077-7ff7285d5084 266->269 275 7ff7285d5033-7ff7285d5037 267->275 276 7ff7285d5017 267->276 268->269 271 7ff7285d5086-7ff7285d509c call 7ff7285d4d6c 269->271 272 7ff7285d509f-7ff7285d50ae call 7ff7285d47d0 call 7ff7285d47c0 269->272 271->272 272->142 275->266 281 7ff7285d5039-7ff7285d5057 call 7ff7285d7c94 275->281 279 7ff7285d501a-7ff7285d5021 276->279 279->275 282 7ff7285d5023-7ff7285d5031 279->282 287 7ff7285d5063-7ff7285d506a 281->287 282->275 282->279 287->266 288 7ff7285d5059-7ff7285d505d 287->288 288->266 289 7ff7285d505f 288->289 289->287
                                                                                        APIs
                                                                                        • _get_daylight.LIBCMT ref: 00007FF7285D4E95
                                                                                          • Part of subcall function 00007FF7285D47E8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7285D47FC
                                                                                          • Part of subcall function 00007FF7285C9E48: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E5E
                                                                                          • Part of subcall function 00007FF7285C9E48: GetLastError.KERNEL32(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E68
                                                                                          • Part of subcall function 00007FF7285C9E00: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF7285C9DDF,?,?,?,?,?,00007FF7285C221C), ref: 00007FF7285C9E09
                                                                                          • Part of subcall function 00007FF7285C9E00: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7285C9DDF,?,?,?,?,?,00007FF7285C221C), ref: 00007FF7285C9E2E
                                                                                        • _get_daylight.LIBCMT ref: 00007FF7285D4E84
                                                                                          • Part of subcall function 00007FF7285D4848: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7285D485C
                                                                                        • _get_daylight.LIBCMT ref: 00007FF7285D50FA
                                                                                        • _get_daylight.LIBCMT ref: 00007FF7285D510B
                                                                                        • _get_daylight.LIBCMT ref: 00007FF7285D511C
                                                                                        • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7285D535C), ref: 00007FF7285D5143
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureInformationLanguagesLastPreferredPresentProcessProcessorRestoreThreadTimeZone
                                                                                        • String ID: W. Europe Standard Time$W. Europe Summer Time
                                                                                        • API String ID: 1458651798-690618308
                                                                                        • Opcode ID: d0b24d2932c4ad6ce00caff4c74da18a926a82f58135b852f5126ac34a18b219
                                                                                        • Instruction ID: f9606c6193d4b824715b7f2ba95252a8ef901e2280dcef79920dbbd7e49f5c7d
                                                                                        • Opcode Fuzzy Hash: d0b24d2932c4ad6ce00caff4c74da18a926a82f58135b852f5126ac34a18b219
                                                                                        • Instruction Fuzzy Hash: 11D1BE26A0824286EB24BF67DC402B9E361EF54784FC48137EE6D47695DF3EE4418B68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 320 7ff7285d5d9c-7ff7285d5e0f call 7ff7285d5ad0 323 7ff7285d5e11-7ff7285d5e1a call 7ff7285c4454 320->323 324 7ff7285d5e29-7ff7285d5e33 call 7ff7285c6d2c 320->324 329 7ff7285d5e1d-7ff7285d5e24 call 7ff7285c4474 323->329 330 7ff7285d5e35-7ff7285d5e4c call 7ff7285c4454 call 7ff7285c4474 324->330 331 7ff7285d5e4e-7ff7285d5eb7 CreateFileW 324->331 346 7ff7285d616a-7ff7285d618a 329->346 330->329 332 7ff7285d5f34-7ff7285d5f3f GetFileType 331->332 333 7ff7285d5eb9-7ff7285d5ebf 331->333 339 7ff7285d5f41-7ff7285d5f7c GetLastError call 7ff7285c43e8 CloseHandle 332->339 340 7ff7285d5f92-7ff7285d5f99 332->340 336 7ff7285d5f01-7ff7285d5f2f GetLastError call 7ff7285c43e8 333->336 337 7ff7285d5ec1-7ff7285d5ec5 333->337 336->329 337->336 344 7ff7285d5ec7-7ff7285d5eff CreateFileW 337->344 339->329 355 7ff7285d5f82-7ff7285d5f8d call 7ff7285c4474 339->355 342 7ff7285d5fa1-7ff7285d5fa4 340->342 343 7ff7285d5f9b-7ff7285d5f9f 340->343 350 7ff7285d5faa-7ff7285d5fff call 7ff7285c6c44 342->350 351 7ff7285d5fa6 342->351 343->350 344->332 344->336 358 7ff7285d6001-7ff7285d600d call 7ff7285d5cd8 350->358 359 7ff7285d601e-7ff7285d604f call 7ff7285d5850 350->359 351->350 355->329 358->359 367 7ff7285d600f 358->367 365 7ff7285d6055-7ff7285d6097 359->365 366 7ff7285d6051-7ff7285d6053 359->366 369 7ff7285d60b9-7ff7285d60c4 365->369 370 7ff7285d6099-7ff7285d609d 365->370 368 7ff7285d6011-7ff7285d6019 call 7ff7285c9fc0 366->368 367->368 368->346 372 7ff7285d6168 369->372 373 7ff7285d60ca-7ff7285d60ce 369->373 370->369 371 7ff7285d609f-7ff7285d60b4 370->371 371->369 372->346 373->372 375 7ff7285d60d4-7ff7285d6119 CloseHandle CreateFileW 373->375 377 7ff7285d611b-7ff7285d6149 GetLastError call 7ff7285c43e8 call 7ff7285c6e6c 375->377 378 7ff7285d614e-7ff7285d6163 375->378 377->378 378->372
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                        • String ID:
                                                                                        • API String ID: 1617910340-0
                                                                                        • Opcode ID: 4c9dcb694f9da37b9569774e6528ce897b09f0f884fc50d365155145b1bc53bc
                                                                                        • Instruction ID: 13f3309462eca4375779df76f86e275154209dae8ecf61ee1fb8758feade2442
                                                                                        • Opcode Fuzzy Hash: 4c9dcb694f9da37b9569774e6528ce897b09f0f884fc50d365155145b1bc53bc
                                                                                        • Instruction Fuzzy Hash: 4DC1F736B24A4285EB10EF66CC806BDB7A1F749B98B404336DE2E47395CF3AD051CB14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetTempPathW.KERNEL32(?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B6837
                                                                                          • Part of subcall function 00007FF7285B69B0: GetEnvironmentVariableW.KERNEL32(00007FF7285B3707), ref: 00007FF7285B69EA
                                                                                          • Part of subcall function 00007FF7285B69B0: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF7285B6A07
                                                                                          • Part of subcall function 00007FF7285C66E4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7285C66FD
                                                                                        • SetEnvironmentVariableW.KERNEL32(?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B68F1
                                                                                          • Part of subcall function 00007FF7285B2770: MessageBoxW.USER32 ref: 00007FF7285B2845
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                                                                        • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                                                        • API String ID: 3752271684-1116378104
                                                                                        • Opcode ID: 1d9e258da007ff631f6f4def1fb3654599ed4050775efbb50ecb9fbb99f68cf7
                                                                                        • Instruction ID: 27a0f6d42d8ba7fc274a1bc8aeaa91b560107e2aec5a312ddfabc6c6c25ba291
                                                                                        • Opcode Fuzzy Hash: 1d9e258da007ff631f6f4def1fb3654599ed4050775efbb50ecb9fbb99f68cf7
                                                                                        • Instruction Fuzzy Hash: C5514611B0964381FB54BA67AC116BAD2C1DF95BC0F845033ED0E4B79BED2EE5028E28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 772 7ff7285d50cc-7ff7285d5101 call 7ff7285d47d8 call 7ff7285d47e0 call 7ff7285d4848 779 7ff7285d523f-7ff7285d52ad call 7ff7285c9e00 call 7ff7285d06e8 772->779 780 7ff7285d5107-7ff7285d5112 call 7ff7285d47e8 772->780 791 7ff7285d52af-7ff7285d52b6 779->791 792 7ff7285d52bb-7ff7285d52be 779->792 780->779 785 7ff7285d5118-7ff7285d5123 call 7ff7285d4818 780->785 785->779 793 7ff7285d5129-7ff7285d514c call 7ff7285c9e48 GetTimeZoneInformation 785->793 794 7ff7285d534b-7ff7285d534e 791->794 795 7ff7285d52f5-7ff7285d5308 call 7ff7285ccafc 792->795 796 7ff7285d52c0 792->796 805 7ff7285d5214-7ff7285d523e call 7ff7285d47d0 call 7ff7285d47c0 call 7ff7285d47c8 793->805 806 7ff7285d5152-7ff7285d5173 793->806 798 7ff7285d52c3 call 7ff7285d50cc 794->798 799 7ff7285d5354-7ff7285d535c call 7ff7285d4e50 794->799 812 7ff7285d5313-7ff7285d532e call 7ff7285d06e8 795->812 813 7ff7285d530a 795->813 796->798 810 7ff7285d52c8-7ff7285d52f4 call 7ff7285c9e48 call 7ff7285badb0 798->810 799->810 807 7ff7285d5175-7ff7285d517b 806->807 808 7ff7285d517e-7ff7285d5185 806->808 807->808 815 7ff7285d5187-7ff7285d518f 808->815 816 7ff7285d5199 808->816 828 7ff7285d5335-7ff7285d5347 call 7ff7285c9e48 812->828 829 7ff7285d5330-7ff7285d5333 812->829 814 7ff7285d530c-7ff7285d5311 call 7ff7285c9e48 813->814 814->796 815->816 821 7ff7285d5191-7ff7285d5197 815->821 822 7ff7285d519b-7ff7285d520f call 7ff7285bc240 * 4 call 7ff7285d1cac call 7ff7285d5364 * 2 816->822 821->822 822->805 828->794 829->814
                                                                                        APIs
                                                                                        • _get_daylight.LIBCMT ref: 00007FF7285D50FA
                                                                                          • Part of subcall function 00007FF7285D4848: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7285D485C
                                                                                        • _get_daylight.LIBCMT ref: 00007FF7285D510B
                                                                                          • Part of subcall function 00007FF7285D47E8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7285D47FC
                                                                                        • _get_daylight.LIBCMT ref: 00007FF7285D511C
                                                                                          • Part of subcall function 00007FF7285D4818: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7285D482C
                                                                                          • Part of subcall function 00007FF7285C9E48: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E5E
                                                                                          • Part of subcall function 00007FF7285C9E48: GetLastError.KERNEL32(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E68
                                                                                        • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7285D535C), ref: 00007FF7285D5143
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _get_daylight_invalid_parameter_noinfo$ErrorInformationLanguagesLastPreferredRestoreThreadTimeZone
                                                                                        • String ID: W. Europe Standard Time$W. Europe Summer Time
                                                                                        • API String ID: 2248164782-690618308
                                                                                        • Opcode ID: 6a4653e18601d3b1e77d8173c576dc07d233a5b3d88cbe8539a6bd7f52c7a8a1
                                                                                        • Instruction ID: 591554d80e943cc3292ad6bce8143b8a910369fb4617d4208ef2feabcfd6ba7c
                                                                                        • Opcode Fuzzy Hash: 6a4653e18601d3b1e77d8173c576dc07d233a5b3d88cbe8539a6bd7f52c7a8a1
                                                                                        • Instruction Fuzzy Hash: B7518A32A0864286E710FF67EC802A9E360FB58784F808137EE5D47695DF3EE4418F68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _fread_nolock$Message_invalid_parameter_noinfo
                                                                                        • String ID: Cannot read Table of Contents.$Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                                                        • API String ID: 2153230061-4158440160
                                                                                        • Opcode ID: 660863432752828610dd78bf0725a2ff623ecfc56849ecc0e669c4ffca38ac1e
                                                                                        • Instruction ID: 0e3cba0304a3d88c1ec15b3499a1a1311ef6789b4626fb3439ea5aca36338454
                                                                                        • Opcode Fuzzy Hash: 660863432752828610dd78bf0725a2ff623ecfc56849ecc0e669c4ffca38ac1e
                                                                                        • Instruction Fuzzy Hash: 9D518E72A0960686EB54EF26DC50279F3A1EF58B84B808137E90C87799DF3DE540CF68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 53 7ff7285b1440-7ff7285b1457 call 7ff7285b6740 56 7ff7285b1462-7ff7285b1485 call 7ff7285b6a60 53->56 57 7ff7285b1459-7ff7285b1461 53->57 60 7ff7285b14a7-7ff7285b14ad 56->60 61 7ff7285b1487-7ff7285b14a2 call 7ff7285b24d0 56->61 62 7ff7285b14af-7ff7285b14ba call 7ff7285b3cd0 60->62 63 7ff7285b14e0-7ff7285b14f4 call 7ff7285bf964 60->63 68 7ff7285b1635-7ff7285b1647 61->68 69 7ff7285b14bf-7ff7285b14c5 62->69 72 7ff7285b1516-7ff7285b151a 63->72 73 7ff7285b14f6-7ff7285b1511 call 7ff7285b24d0 63->73 69->63 71 7ff7285b14c7-7ff7285b14db call 7ff7285b2770 69->71 84 7ff7285b1617-7ff7285b161d 71->84 76 7ff7285b1534-7ff7285b1554 call 7ff7285c40e0 72->76 77 7ff7285b151c-7ff7285b1528 call 7ff7285b1050 72->77 73->84 85 7ff7285b1575-7ff7285b157b 76->85 86 7ff7285b1556-7ff7285b1570 call 7ff7285b24d0 76->86 82 7ff7285b152d-7ff7285b152f 77->82 82->84 87 7ff7285b161f call 7ff7285bf2dc 84->87 88 7ff7285b162b-7ff7285b162e call 7ff7285bf2dc 84->88 90 7ff7285b1581-7ff7285b1586 85->90 91 7ff7285b1605-7ff7285b1608 call 7ff7285c40cc 85->91 99 7ff7285b160d-7ff7285b1612 86->99 98 7ff7285b1624 87->98 94 7ff7285b1633 88->94 97 7ff7285b1590-7ff7285b15b2 call 7ff7285bf62c 90->97 91->99 94->68 102 7ff7285b15e5-7ff7285b15ec 97->102 103 7ff7285b15b4-7ff7285b15cc call 7ff7285bfd6c 97->103 98->88 99->84 104 7ff7285b15f3-7ff7285b15fb call 7ff7285b24d0 102->104 109 7ff7285b15d5-7ff7285b15e3 103->109 110 7ff7285b15ce-7ff7285b15d1 103->110 112 7ff7285b1600 104->112 109->104 110->97 111 7ff7285b15d3 110->111 111->112 112->91
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                                                        • API String ID: 0-666925554
                                                                                        • Opcode ID: 53cb2eeb417c3aa7c3f852847a0f55183b61ec4cba2ace7e1a5d76acfce00c30
                                                                                        • Instruction ID: ffea216d831bdf26be4788cde73bd1435d0a3eb3594f036399b8dfc625fb5c5f
                                                                                        • Opcode Fuzzy Hash: 53cb2eeb417c3aa7c3f852847a0f55183b61ec4cba2ace7e1a5d76acfce00c30
                                                                                        • Instruction Fuzzy Hash: 6C519121B4864281EB11BB23AC446B9E390EF617D4FC44033DD1D47B99EE3EE5558F28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000000,00007FF7285B687A,?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B7910
                                                                                        • OpenProcessToken.ADVAPI32(?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B7921
                                                                                        • GetTokenInformation.KERNELBASE(?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B7943
                                                                                        • GetLastError.KERNEL32(?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B794D
                                                                                        • GetTokenInformation.KERNELBASE(?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B798A
                                                                                        • ConvertSidToStringSidW.ADVAPI32 ref: 00007FF7285B799C
                                                                                        • CloseHandle.KERNEL32(?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B79B4
                                                                                        • LocalFree.KERNEL32(?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B79E6
                                                                                        • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00007FF7285B7A0D
                                                                                        • CreateDirectoryW.KERNELBASE(?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B7A1E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Token$ConvertDescriptorInformationProcessSecurityString$CloseCreateCurrentDirectoryErrorFreeHandleLastLocalOpen
                                                                                        • String ID: D:(A;;FA;;;%s)$S-1-3-4
                                                                                        • API String ID: 4998090-2855260032
                                                                                        • Opcode ID: 03e154d72cef7596c19cf90f58cf8d02b1ad3eb61a0626a7ad8befbf5a95a7ea
                                                                                        • Instruction ID: b3b2eca369c61bdf35cbd8e31a8016bc242a7bf1ee267f4893de4f14fc33683f
                                                                                        • Opcode Fuzzy Hash: 03e154d72cef7596c19cf90f58cf8d02b1ad3eb61a0626a7ad8befbf5a95a7ea
                                                                                        • Instruction Fuzzy Hash: 04416C3161CA8682EB50AF62EC447AAE361FB84794F840232FA5E477D9DF3DD544CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                                        • String ID: CreateProcessW$Error creating child process!
                                                                                        • API String ID: 2895956056-3524285272
                                                                                        • Opcode ID: 70482ae767ba9e09b517fd1531fb7070f55263243fe81ec667caeea18f8722ee
                                                                                        • Instruction ID: ad8971a928c63987516fbe900e0f4489c8e158f9ac7849e5e3583e9e894f61e5
                                                                                        • Opcode Fuzzy Hash: 70482ae767ba9e09b517fd1531fb7070f55263243fe81ec667caeea18f8722ee
                                                                                        • Instruction Fuzzy Hash: 23413231A0878282DB20AB61EC452AAF3A0FB94360F804336EAAD437D9DF7DD1548F54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 383 7ff7285b1000-7ff7285b36a6 call 7ff7285bf0b0 call 7ff7285bf0a8 call 7ff7285b7630 call 7ff7285bf0a8 call 7ff7285bade0 call 7ff7285c42a0 call 7ff7285c4f44 call 7ff7285b1af0 401 7ff7285b37ba 383->401 402 7ff7285b36ac-7ff7285b36bb call 7ff7285b3bc0 383->402 403 7ff7285b37bf-7ff7285b37df call 7ff7285badb0 401->403 402->401 408 7ff7285b36c1-7ff7285b36d4 call 7ff7285b3a90 402->408 408->401 411 7ff7285b36da-7ff7285b36ed call 7ff7285b3b40 408->411 411->401 414 7ff7285b36f3-7ff7285b371a call 7ff7285b69b0 411->414 417 7ff7285b375c-7ff7285b3784 call 7ff7285b6fc0 call 7ff7285b19d0 414->417 418 7ff7285b371c-7ff7285b372b call 7ff7285b69b0 414->418 429 7ff7285b378a-7ff7285b37a0 call 7ff7285b19d0 417->429 430 7ff7285b386d-7ff7285b387e 417->430 418->417 424 7ff7285b372d-7ff7285b3733 418->424 426 7ff7285b373f-7ff7285b3759 call 7ff7285c40cc call 7ff7285b6fc0 424->426 427 7ff7285b3735-7ff7285b373d 424->427 426->417 427->426 442 7ff7285b37a2-7ff7285b37b5 call 7ff7285b2770 429->442 443 7ff7285b37e0-7ff7285b37e3 429->443 432 7ff7285b3880-7ff7285b388a call 7ff7285b32a0 430->432 433 7ff7285b3893-7ff7285b38ab call 7ff7285b7a60 430->433 445 7ff7285b38cb-7ff7285b38d8 call 7ff7285b5e60 432->445 446 7ff7285b388c 432->446 447 7ff7285b38ad-7ff7285b38b9 call 7ff7285b2770 433->447 448 7ff7285b38be-7ff7285b38c5 SetDllDirectoryW 433->448 442->401 443->430 444 7ff7285b37e9-7ff7285b3800 call 7ff7285b3cd0 443->444 458 7ff7285b3802-7ff7285b3805 444->458 459 7ff7285b3807-7ff7285b3833 call 7ff7285b7230 444->459 456 7ff7285b3926-7ff7285b392b call 7ff7285b5de0 445->456 457 7ff7285b38da-7ff7285b38ea call 7ff7285b5b00 445->457 446->433 447->401 448->445 464 7ff7285b3930-7ff7285b3933 456->464 457->456 470 7ff7285b38ec-7ff7285b38fb call 7ff7285b5660 457->470 461 7ff7285b3842-7ff7285b3858 call 7ff7285b2770 458->461 471 7ff7285b3835-7ff7285b383d call 7ff7285bf2dc 459->471 472 7ff7285b385d-7ff7285b386b 459->472 461->401 468 7ff7285b39e6-7ff7285b39f5 call 7ff7285b3130 464->468 469 7ff7285b3939-7ff7285b3946 464->469 468->401 487 7ff7285b39fb-7ff7285b3a32 call 7ff7285b6f50 call 7ff7285b69b0 call 7ff7285b53f0 468->487 474 7ff7285b3950-7ff7285b395a 469->474 485 7ff7285b38fd-7ff7285b3909 call 7ff7285b55e0 470->485 486 7ff7285b391c-7ff7285b3921 call 7ff7285b58b0 470->486 471->461 472->432 478 7ff7285b3963-7ff7285b3965 474->478 479 7ff7285b395c-7ff7285b3961 474->479 483 7ff7285b39b1-7ff7285b39e1 call 7ff7285b3290 call 7ff7285b30d0 call 7ff7285b3280 call 7ff7285b58b0 call 7ff7285b5de0 478->483 484 7ff7285b3967-7ff7285b398a call 7ff7285b1b30 478->484 479->474 479->478 483->403 484->401 497 7ff7285b3990-7ff7285b399b 484->497 485->486 498 7ff7285b390b-7ff7285b391a call 7ff7285b5cb0 485->498 486->456 487->401 511 7ff7285b3a38-7ff7285b3a4b call 7ff7285b3290 call 7ff7285b7000 487->511 501 7ff7285b39a0-7ff7285b39af 497->501 498->464 501->483 501->501 518 7ff7285b3a50-7ff7285b3a6d call 7ff7285b58b0 call 7ff7285b5de0 511->518 523 7ff7285b3a6f-7ff7285b3a72 call 7ff7285b6cc0 518->523 524 7ff7285b3a77-7ff7285b3a81 call 7ff7285b1ab0 518->524 523->524 524->403
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF7285B3BC0: GetModuleFileNameW.KERNEL32(?,00007FF7285B36B9), ref: 00007FF7285B3BF1
                                                                                        • SetDllDirectoryW.KERNEL32 ref: 00007FF7285B38C5
                                                                                          • Part of subcall function 00007FF7285B69B0: GetEnvironmentVariableW.KERNEL32(00007FF7285B3707), ref: 00007FF7285B69EA
                                                                                          • Part of subcall function 00007FF7285B69B0: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF7285B6A07
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                                                        • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                                                        • API String ID: 2344891160-3602715111
                                                                                        • Opcode ID: 688f6b35e79af08c7bd1954260b19f73ad8249a08192b0706c29340b8d4f4ce6
                                                                                        • Instruction ID: 2cb4643f963b0dcb752a97e2a25acee54cc67543c165ff9862102f921bd787fe
                                                                                        • Opcode Fuzzy Hash: 688f6b35e79af08c7bd1954260b19f73ad8249a08192b0706c29340b8d4f4ce6
                                                                                        • Instruction Fuzzy Hash: DAB19221A1C58341FB65BB239C512FDD291EF60784FC44033EA4D5779EEE2EE6098B68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 528 7ff7285b1050-7ff7285b10ab call 7ff7285ba640 531 7ff7285b10d3-7ff7285b10eb call 7ff7285c40e0 528->531 532 7ff7285b10ad-7ff7285b10d2 call 7ff7285b2770 528->532 537 7ff7285b1109-7ff7285b1119 call 7ff7285c40e0 531->537 538 7ff7285b10ed-7ff7285b1104 call 7ff7285b24d0 531->538 544 7ff7285b1137-7ff7285b1147 537->544 545 7ff7285b111b-7ff7285b1132 call 7ff7285b24d0 537->545 543 7ff7285b126c-7ff7285b1281 call 7ff7285ba320 call 7ff7285c40cc * 2 538->543 561 7ff7285b1286-7ff7285b12a0 543->561 548 7ff7285b1150-7ff7285b1175 call 7ff7285bf62c 544->548 545->543 554 7ff7285b125e 548->554 555 7ff7285b117b-7ff7285b1185 call 7ff7285bf3a0 548->555 559 7ff7285b1264 554->559 555->554 562 7ff7285b118b-7ff7285b1197 555->562 559->543 563 7ff7285b11a0-7ff7285b11c8 call 7ff7285b8a90 562->563 566 7ff7285b1241-7ff7285b125c call 7ff7285b2770 563->566 567 7ff7285b11ca-7ff7285b11cd 563->567 566->559 568 7ff7285b11cf-7ff7285b11d9 567->568 569 7ff7285b123c 567->569 571 7ff7285b1203-7ff7285b1206 568->571 572 7ff7285b11db-7ff7285b11e8 call 7ff7285bfd6c 568->572 569->566 574 7ff7285b1219-7ff7285b121e 571->574 575 7ff7285b1208-7ff7285b1216 call 7ff7285bbb90 571->575 579 7ff7285b11ed-7ff7285b11f0 572->579 574->563 578 7ff7285b1220-7ff7285b1223 574->578 575->574 581 7ff7285b1225-7ff7285b1228 578->581 582 7ff7285b1237-7ff7285b123a 578->582 583 7ff7285b11f2-7ff7285b11fc call 7ff7285bf3a0 579->583 584 7ff7285b11fe-7ff7285b1201 579->584 581->566 585 7ff7285b122a-7ff7285b1232 581->585 582->559 583->574 583->584 584->566 585->548
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message
                                                                                        • String ID: 1.2.13$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                                        • API String ID: 2030045667-1655038675
                                                                                        • Opcode ID: 8ac0773f6c67419f56cda63ff3c0794e3adb5341b88274088c89ab46326555b3
                                                                                        • Instruction ID: ca289dca383cafdec207b980fa48326dd3bae46dfeb45a7c9b9d0e4d5e6cc827
                                                                                        • Opcode Fuzzy Hash: 8ac0773f6c67419f56cda63ff3c0794e3adb5341b88274088c89ab46326555b3
                                                                                        • Instruction Fuzzy Hash: 1251C622A0964285EB60BB53EC403BAE291FB54794FC44133EE4D47789EE3EE555CB28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 659 7ff7285caf5c-7ff7285caf82 660 7ff7285caf84-7ff7285caf98 call 7ff7285c4454 call 7ff7285c4474 659->660 661 7ff7285caf9d-7ff7285cafa1 659->661 675 7ff7285cb38e 660->675 662 7ff7285cb377-7ff7285cb383 call 7ff7285c4454 call 7ff7285c4474 661->662 663 7ff7285cafa7-7ff7285cafae 661->663 682 7ff7285cb389 call 7ff7285c9de0 662->682 663->662 665 7ff7285cafb4-7ff7285cafe2 663->665 665->662 668 7ff7285cafe8-7ff7285cafef 665->668 672 7ff7285caff1-7ff7285cb003 call 7ff7285c4454 call 7ff7285c4474 668->672 673 7ff7285cb008-7ff7285cb00b 668->673 672->682 678 7ff7285cb373-7ff7285cb375 673->678 679 7ff7285cb011-7ff7285cb017 673->679 680 7ff7285cb391-7ff7285cb3a8 675->680 678->680 679->678 683 7ff7285cb01d-7ff7285cb020 679->683 682->675 683->672 686 7ff7285cb022-7ff7285cb047 683->686 688 7ff7285cb049-7ff7285cb04b 686->688 689 7ff7285cb07a-7ff7285cb081 686->689 692 7ff7285cb072-7ff7285cb078 688->692 693 7ff7285cb04d-7ff7285cb054 688->693 690 7ff7285cb083-7ff7285cb0ab call 7ff7285ccafc call 7ff7285c9e48 * 2 689->690 691 7ff7285cb056-7ff7285cb06d call 7ff7285c4454 call 7ff7285c4474 call 7ff7285c9de0 689->691 719 7ff7285cb0ad-7ff7285cb0c3 call 7ff7285c4474 call 7ff7285c4454 690->719 720 7ff7285cb0c8-7ff7285cb0f3 call 7ff7285cb784 690->720 723 7ff7285cb200 691->723 695 7ff7285cb0f8-7ff7285cb10f 692->695 693->691 693->692 698 7ff7285cb111-7ff7285cb119 695->698 699 7ff7285cb18a-7ff7285cb194 call 7ff7285d2a6c 695->699 698->699 703 7ff7285cb11b-7ff7285cb11d 698->703 710 7ff7285cb21e 699->710 711 7ff7285cb19a-7ff7285cb1af 699->711 703->699 707 7ff7285cb11f-7ff7285cb135 703->707 707->699 712 7ff7285cb137-7ff7285cb143 707->712 714 7ff7285cb223-7ff7285cb243 ReadFile 710->714 711->710 716 7ff7285cb1b1-7ff7285cb1c3 GetConsoleMode 711->716 712->699 717 7ff7285cb145-7ff7285cb147 712->717 721 7ff7285cb33d-7ff7285cb346 GetLastError 714->721 722 7ff7285cb249-7ff7285cb251 714->722 716->710 724 7ff7285cb1c5-7ff7285cb1cd 716->724 717->699 725 7ff7285cb149-7ff7285cb161 717->725 719->723 720->695 730 7ff7285cb363-7ff7285cb366 721->730 731 7ff7285cb348-7ff7285cb35e call 7ff7285c4474 call 7ff7285c4454 721->731 722->721 727 7ff7285cb257 722->727 732 7ff7285cb203-7ff7285cb20d call 7ff7285c9e48 723->732 724->714 729 7ff7285cb1cf-7ff7285cb1f1 ReadConsoleW 724->729 725->699 733 7ff7285cb163-7ff7285cb16f 725->733 738 7ff7285cb25e-7ff7285cb273 727->738 740 7ff7285cb1f3 GetLastError 729->740 741 7ff7285cb212-7ff7285cb21c 729->741 735 7ff7285cb36c-7ff7285cb36e 730->735 736 7ff7285cb1f9-7ff7285cb1fb call 7ff7285c43e8 730->736 731->723 732->680 733->699 734 7ff7285cb171-7ff7285cb173 733->734 734->699 744 7ff7285cb175-7ff7285cb185 734->744 735->732 736->723 738->732 746 7ff7285cb275-7ff7285cb280 738->746 740->736 741->738 744->699 751 7ff7285cb282-7ff7285cb29b call 7ff7285cab74 746->751 752 7ff7285cb2a7-7ff7285cb2af 746->752 759 7ff7285cb2a0-7ff7285cb2a2 751->759 755 7ff7285cb2b1-7ff7285cb2c3 752->755 756 7ff7285cb32b-7ff7285cb338 call 7ff7285ca9b4 752->756 760 7ff7285cb2c5 755->760 761 7ff7285cb31e-7ff7285cb326 755->761 756->759 759->732 763 7ff7285cb2ca-7ff7285cb2d1 760->763 761->732 764 7ff7285cb2d3-7ff7285cb2d7 763->764 765 7ff7285cb30d-7ff7285cb318 763->765 766 7ff7285cb2f3 764->766 767 7ff7285cb2d9-7ff7285cb2e0 764->767 765->761 769 7ff7285cb2f9-7ff7285cb309 766->769 767->766 768 7ff7285cb2e2-7ff7285cb2e6 767->768 768->766 770 7ff7285cb2e8-7ff7285cb2f1 768->770 769->763 771 7ff7285cb30b 769->771 770->769 771->761
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: bb836f15fd7b84d0eab272938f235470d80225e915ddf6716f0527cb605fae18
                                                                                        • Instruction ID: 300c952063c4e7f17ae00770a211429e6c839092257f003bd26428f39c276061
                                                                                        • Opcode Fuzzy Hash: bb836f15fd7b84d0eab272938f235470d80225e915ddf6716f0527cb605fae18
                                                                                        • Instruction Fuzzy Hash: 5FC1C42290CA8691EB51AB169C402BEF7A0FB81B80FD54132DA5D07791CF7EE855CF39
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 849 7ff7285cc460-7ff7285cc485 850 7ff7285cc753 849->850 851 7ff7285cc48b-7ff7285cc48e 849->851 852 7ff7285cc755-7ff7285cc765 850->852 853 7ff7285cc490-7ff7285cc4c2 call 7ff7285c9d14 851->853 854 7ff7285cc4c7-7ff7285cc4f3 851->854 853->852 856 7ff7285cc4f5-7ff7285cc4fc 854->856 857 7ff7285cc4fe-7ff7285cc504 854->857 856->853 856->857 858 7ff7285cc514-7ff7285cc529 call 7ff7285d2a6c 857->858 859 7ff7285cc506-7ff7285cc50f call 7ff7285cb820 857->859 864 7ff7285cc643-7ff7285cc64c 858->864 865 7ff7285cc52f-7ff7285cc538 858->865 859->858 866 7ff7285cc6a0-7ff7285cc6c5 WriteFile 864->866 867 7ff7285cc64e-7ff7285cc654 864->867 865->864 868 7ff7285cc53e-7ff7285cc542 865->868 869 7ff7285cc6d0 866->869 870 7ff7285cc6c7-7ff7285cc6cd GetLastError 866->870 871 7ff7285cc656-7ff7285cc659 867->871 872 7ff7285cc68c-7ff7285cc69e call 7ff7285cbf18 867->872 873 7ff7285cc553-7ff7285cc55e 868->873 874 7ff7285cc544-7ff7285cc54c call 7ff7285c3a50 868->874 875 7ff7285cc6d3 869->875 870->869 876 7ff7285cc65b-7ff7285cc65e 871->876 877 7ff7285cc678-7ff7285cc68a call 7ff7285cc138 871->877 890 7ff7285cc630-7ff7285cc637 872->890 879 7ff7285cc56f-7ff7285cc584 GetConsoleMode 873->879 880 7ff7285cc560-7ff7285cc569 873->880 874->873 882 7ff7285cc6d8 875->882 883 7ff7285cc6e4-7ff7285cc6ee 876->883 884 7ff7285cc664-7ff7285cc676 call 7ff7285cc01c 876->884 877->890 887 7ff7285cc63c 879->887 888 7ff7285cc58a-7ff7285cc590 879->888 880->864 880->879 891 7ff7285cc6dd 882->891 892 7ff7285cc6f0-7ff7285cc6f5 883->892 893 7ff7285cc74c-7ff7285cc751 883->893 884->890 887->864 896 7ff7285cc596-7ff7285cc599 888->896 897 7ff7285cc619-7ff7285cc62b call 7ff7285cbaa0 888->897 890->882 891->883 901 7ff7285cc723-7ff7285cc72d 892->901 902 7ff7285cc6f7-7ff7285cc6fa 892->902 893->852 898 7ff7285cc5a4-7ff7285cc5b2 896->898 899 7ff7285cc59b-7ff7285cc59e 896->899 897->890 906 7ff7285cc5b4 898->906 907 7ff7285cc610-7ff7285cc614 898->907 899->891 899->898 904 7ff7285cc734-7ff7285cc743 901->904 905 7ff7285cc72f-7ff7285cc732 901->905 908 7ff7285cc713-7ff7285cc71e call 7ff7285c4430 902->908 909 7ff7285cc6fc-7ff7285cc70b 902->909 904->893 905->850 905->904 910 7ff7285cc5b8-7ff7285cc5cf call 7ff7285d2b38 906->910 907->875 908->901 909->908 915 7ff7285cc5d1-7ff7285cc5dd 910->915 916 7ff7285cc607-7ff7285cc60d GetLastError 910->916 917 7ff7285cc5df-7ff7285cc5f1 call 7ff7285d2b38 915->917 918 7ff7285cc5fc-7ff7285cc603 915->918 916->907 917->916 922 7ff7285cc5f3-7ff7285cc5fa 917->922 918->907 920 7ff7285cc605 918->920 920->910 922->918
                                                                                        APIs
                                                                                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF7285CC44B), ref: 00007FF7285CC57C
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF7285CC44B), ref: 00007FF7285CC607
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConsoleErrorLastMode
                                                                                        • String ID:
                                                                                        • API String ID: 953036326-0
                                                                                        • Opcode ID: 5c9562be74e3e011b14f36cc2d5f23b575e471fae160cb885922e2a719cf7448
                                                                                        • Instruction ID: 041e5dba09714e549d01c12a47160c943994dc3f8911bc248598d1436955ccfa
                                                                                        • Opcode Fuzzy Hash: 5c9562be74e3e011b14f36cc2d5f23b575e471fae160cb885922e2a719cf7448
                                                                                        • Instruction Fuzzy Hash: 4391B722E1865145F750EF6A8C4027DEBA0EB04788FD4513BDE4E57A94CF3AD8858F34
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _get_daylight$_isindst
                                                                                        • String ID:
                                                                                        • API String ID: 4170891091-0
                                                                                        • Opcode ID: 8bf97934fac92d6cf6f5aeec7a7ab7ef5245e80df15cb27ed03d14056eff3848
                                                                                        • Instruction ID: 76a30a4df25d07f4b8c8573c68204d322bc38bd6427903b6edaeec4cc83273ed
                                                                                        • Opcode Fuzzy Hash: 8bf97934fac92d6cf6f5aeec7a7ab7ef5245e80df15cb27ed03d14056eff3848
                                                                                        • Instruction Fuzzy Hash: 4651E672F042118AFB14EF66DD456BCE7A1FB10368F904136DE1E52AE5DB39A402CF24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                                                        • String ID:
                                                                                        • API String ID: 2780335769-0
                                                                                        • Opcode ID: d9e71bfbd9056d5791af8277c019f266518636ad6a626a0e1cf9b13b5e51ab0b
                                                                                        • Instruction ID: 7516694433cf4f783eaf8de426a512c04f042ca9fe7e70bcb32a892ebbe9b9ec
                                                                                        • Opcode Fuzzy Hash: d9e71bfbd9056d5791af8277c019f266518636ad6a626a0e1cf9b13b5e51ab0b
                                                                                        • Instruction Fuzzy Hash: 8F518022E086518AFB50EF62DC407BDF3A2EB48B48F508136DE4D57689DF39D4418F24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                        • String ID:
                                                                                        • API String ID: 1452418845-0
                                                                                        • Opcode ID: bbd3b8ba5c4b27b365bd4a2e4f7617ab8f70cbce2ec9e80b5769bfa1af1ddc25
                                                                                        • Instruction ID: 520fe843466236ec6a698f72044791271bb7c08f0a9c0826c1ca3b280b85c9a8
                                                                                        • Opcode Fuzzy Hash: bbd3b8ba5c4b27b365bd4a2e4f7617ab8f70cbce2ec9e80b5769bfa1af1ddc25
                                                                                        • Instruction Fuzzy Hash: 37314910E0890745FB54BB639C523B9E291EFA1344FC40036E94D473DBDEAEA8048F7A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 1279662727-0
                                                                                        • Opcode ID: ac9b60a2d89b0b0a1de2f8cf3a80ca4050063b0902c77aa6c040af4779bb7447
                                                                                        • Instruction ID: 6a31145fa0218ac2e7dbb9da75c00d64ff9d44b8ecda5970ecaeb26b11dcac29
                                                                                        • Opcode Fuzzy Hash: ac9b60a2d89b0b0a1de2f8cf3a80ca4050063b0902c77aa6c040af4779bb7447
                                                                                        • Instruction Fuzzy Hash: F041E522D1878283E714AB229D00779E3A0FB957A4F50C336EA5C03AD1DF6DA0E58F24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: e6b31fcbb010569d964db91d6e465c54053a5eb593f9b70391a20bf1ad845ba7
                                                                                        • Instruction ID: f4217ce442b79f5799f80ba60c0f6ec3bcfb6c0e8ed9723483f046e19f44d2d4
                                                                                        • Opcode Fuzzy Hash: e6b31fcbb010569d964db91d6e465c54053a5eb593f9b70391a20bf1ad845ba7
                                                                                        • Instruction Fuzzy Hash: DC51F961A0964246EB28AE279C0067EE691EF50BB4F945732DD6C43BDDCF3ED4018E28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Initialize_invalid_parameter_noinfo_set_fmode
                                                                                        • String ID:
                                                                                        • API String ID: 3548387204-0
                                                                                        • Opcode ID: 1e90ea8750eee40ec6509e71a0aeef04b9b8875fa73e4f4fdef0a793ea833389
                                                                                        • Instruction ID: 5de764a55dcfe8c2a4ef59c0a6b5936fd875439c4289fbda5084493d44fec18e
                                                                                        • Opcode Fuzzy Hash: 1e90ea8750eee40ec6509e71a0aeef04b9b8875fa73e4f4fdef0a793ea833389
                                                                                        • Instruction Fuzzy Hash: 5B115550E08A0741FB187BB74C562FAC581DFA0344FC44436E91E463DBAE9FA9858E7A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF7285C9ED5,?,?,00000000,00007FF7285C9F8A), ref: 00007FF7285CA0C6
                                                                                        • GetLastError.KERNEL32(?,?,?,00007FF7285C9ED5,?,?,00000000,00007FF7285C9F8A), ref: 00007FF7285CA0D0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ChangeCloseErrorFindLastNotification
                                                                                        • String ID:
                                                                                        • API String ID: 1687624791-0
                                                                                        • Opcode ID: 92f4f4d1d4744ab8e3e5075f9c3f1c4e1aa1a51ff1876d4144c1ee488cb6abae
                                                                                        • Instruction ID: 917807e1695bf29671b74308debc136d145539908cba134875ca8a1736600a7a
                                                                                        • Opcode Fuzzy Hash: 92f4f4d1d4744ab8e3e5075f9c3f1c4e1aa1a51ff1876d4144c1ee488cb6abae
                                                                                        • Instruction Fuzzy Hash: 5021B051F0864240FB52A722AC54379DAD1EF44BE0F84423AEA2E472C6CE6EA4548F38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SetFilePointerEx.KERNELBASE(?,?,?,?,00000000,00007FF7285CB7CD), ref: 00007FF7285CB680
                                                                                        • GetLastError.KERNEL32(?,?,?,?,00000000,00007FF7285CB7CD), ref: 00007FF7285CB68A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastPointer
                                                                                        • String ID:
                                                                                        • API String ID: 2976181284-0
                                                                                        • Opcode ID: c2ae5bf7dfd723bcaf49b473343ea681dff7813d4b8ca545b941fb3c7d872366
                                                                                        • Instruction ID: 54e16bd3b9b4afbcd67168fa818ac2fb102f9929fd65f5e6e1853f7a9107e39f
                                                                                        • Opcode Fuzzy Hash: c2ae5bf7dfd723bcaf49b473343ea681dff7813d4b8ca545b941fb3c7d872366
                                                                                        • Instruction Fuzzy Hash: B4118F62A18A8181DB20AB26EC44169E761EB45BF4FD44332EE7D0B7E9CF7DD0508F54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7285C48C1), ref: 00007FF7285C49DF
                                                                                        • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7285C48C1), ref: 00007FF7285C49F5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Time$System$FileLocalSpecific
                                                                                        • String ID:
                                                                                        • API String ID: 1707611234-0
                                                                                        • Opcode ID: 76a0f45c7603eb3144ff1d93a1bd9f2a60a94205705e5cf30b36b262cefc7e5d
                                                                                        • Instruction ID: 369902950716715b7c33e2588e6353566f1276fb283c14ee55c74a6f1ffc2fdb
                                                                                        • Opcode Fuzzy Hash: 76a0f45c7603eb3144ff1d93a1bd9f2a60a94205705e5cf30b36b262cefc7e5d
                                                                                        • Instruction Fuzzy Hash: BE11917160C65281EB54AB16AC0153AF7A1EB85771F901237FA9D819D8EF2ED054CF28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E5E
                                                                                        • GetLastError.KERNEL32(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E68
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                                        • String ID:
                                                                                        • API String ID: 588628887-0
                                                                                        • Opcode ID: 90a3e1b0ca63f129125972b75d02b7296718c6d583bf4673ea5362494b00de43
                                                                                        • Instruction ID: 0258bc3d07d039ca90d8cb3c61cc8f9bdedc1f516f5270944ea97429f7cbc0a1
                                                                                        • Opcode Fuzzy Hash: 90a3e1b0ca63f129125972b75d02b7296718c6d583bf4673ea5362494b00de43
                                                                                        • Instruction Fuzzy Hash: DEE08650F0960243FF15BFF35C44276D161DF94B41BC44036DC0D42251DF2D64558E78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: cd414821b6f546225101efcda0891026701ff68dd4107860c76c66003ece607e
                                                                                        • Instruction ID: d596a5764277e765c762ae3daaa62dc54f3ff05dcc6f2d9f5fbbe9b3412056d4
                                                                                        • Opcode Fuzzy Hash: cd414821b6f546225101efcda0891026701ff68dd4107860c76c66003ece607e
                                                                                        • Instruction Fuzzy Hash: EF41B63291864187EB24EA2BAD41279F3A1EB55B81F940132D68E837D1CF7EE402CF75
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _fread_nolock
                                                                                        • String ID:
                                                                                        • API String ID: 840049012-0
                                                                                        • Opcode ID: a736dec6f9700dca66839670caa3cbb96e83f104f6f51fb0d934cc1cc19ca2ff
                                                                                        • Instruction ID: 505af5d9f6a197f4a51922e79562cb3e13d58d41e138a094fdac80c3c7e86ba8
                                                                                        • Opcode Fuzzy Hash: a736dec6f9700dca66839670caa3cbb96e83f104f6f51fb0d934cc1cc19ca2ff
                                                                                        • Instruction Fuzzy Hash: 2721B421B0925246FB64BB176C047BAE651FF55BD4FC89432EE0C0778ACE3EE001CA28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: 5ed01260f61c1a9edb3b9c9d383e1d052b4bb4cd62c1ee8f87bb56751b307cf1
                                                                                        • Instruction ID: ccab7828085031c922d491712f8ffa619848f956a062a5f961969a25b81a5aa8
                                                                                        • Opcode Fuzzy Hash: 5ed01260f61c1a9edb3b9c9d383e1d052b4bb4cd62c1ee8f87bb56751b307cf1
                                                                                        • Instruction Fuzzy Hash: 733190B1A1865281F712BF568C4037CEA60EF40B90F914237EA2D073D2CF7EA8518E78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: be1079961907d1906d587a3e65c1e024338dd0a3e917ec7f85ba85c18500dcb2
                                                                                        • Instruction ID: 5929b8598b474cffdd7b342aefedda29e52bf7770ceccd4e1709416ff8955d6e
                                                                                        • Opcode Fuzzy Hash: be1079961907d1906d587a3e65c1e024338dd0a3e917ec7f85ba85c18500dcb2
                                                                                        • Instruction Fuzzy Hash: 79116F25A0C64181EB60BF529C4027AE260FF85B81F944433EA8C57A96CF7ED5008F78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: bfd0dbd31329e8855e2ea518bb8c472100a71056899b27504ce81c8632d734fa
                                                                                        • Instruction ID: 8aacb6b9f5770e190262f9a8cb1d976f5a99b787931b0988fceff519d60cc858
                                                                                        • Opcode Fuzzy Hash: bfd0dbd31329e8855e2ea518bb8c472100a71056899b27504ce81c8632d734fa
                                                                                        • Instruction Fuzzy Hash: 49219532A18A4187D761AF1ADC40379F6A0EB84B94FA44236DA6D476D6DF3ED404CF14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: f8ccbbb08b6b64fca274b3102351a157ba9f641dbe881e0fbefe782dfe020abd
                                                                                        • Instruction ID: 843c1c6e74daa547f86ac2925a51197030e74c11724b09fd4c7bcbdbf9d828f2
                                                                                        • Opcode Fuzzy Hash: f8ccbbb08b6b64fca274b3102351a157ba9f641dbe881e0fbefe782dfe020abd
                                                                                        • Instruction Fuzzy Hash: 34018E21A0874241EB04EF539D0116DE691EB95FE4B989632DE9C17BEACE3ED4418F28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: ff7701af8cb768011259a96fb0cdaae69b45464d9f9b930ea94a69369e7e69e2
                                                                                        • Instruction ID: edc3e895d06d99b833daa38d9c3c9fb277b25c6440c4c62532ebe8f6929e9836
                                                                                        • Opcode Fuzzy Hash: ff7701af8cb768011259a96fb0cdaae69b45464d9f9b930ea94a69369e7e69e2
                                                                                        • Instruction Fuzzy Hash: 13119A3291864282F300AB06AC40529FAE1EB85740F85003AE64D47AA3DF7EF910CF38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF7285CA8E6,?,?,?,00007FF7285C9AA3,?,?,00000000,00007FF7285C9D3E), ref: 00007FF7285CDDC5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: 71284afaabaf46e061be5dd41c1ee9242f4793079330fcfb9ee2b8ac464e22c2
                                                                                        • Instruction ID: b6d9bbf59a4d5c3bab0f93210faba226941fa6463a82a3219ceadb858fea91ba
                                                                                        • Opcode Fuzzy Hash: 71284afaabaf46e061be5dd41c1ee9242f4793079330fcfb9ee2b8ac464e22c2
                                                                                        • Instruction Fuzzy Hash: 0FF04984F0920641FF5576635C503B6D290DF49B80F8C8472C90EC6282DF1EF4908E38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(?,?,?,00007FF7285BFE74,?,?,?,00007FF7285C1386,?,?,?,?,?,00007FF7285C2979), ref: 00007FF7285CCB3A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: a7ce567b16112f19067e33b9dc0b94b4c499acd5a025fbf7a889946ef18f26a1
                                                                                        • Instruction ID: 0b5c76a71533837e73655ff4cd7fd366304cc596865a573d052cf1d0e1800386
                                                                                        • Opcode Fuzzy Hash: a7ce567b16112f19067e33b9dc0b94b4c499acd5a025fbf7a889946ef18f26a1
                                                                                        • Instruction Fuzzy Hash: 14F03450B0C24641FF64B6A35C50675D580CF487A8FC84632DC2E962E2DE2EA940DD38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: Failed to get address for PyDict_GetItemString$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyList_New$Failed to get address for PyLong_AsLong$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PySys_AddWarnOption$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetArgvEx$Failed to get address for PySys_SetObject$Failed to get address for PySys_SetPath$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_BuildValue$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_DontWriteBytecodeFlag$Failed to get address for Py_FileSystemDefaultEncoding$Failed to get address for Py_Finalize$Failed to get address for Py_FrozenFlag$Failed to get address for Py_GetPath$Failed to get address for Py_IgnoreEnvironmentFlag$Failed to get address for Py_IncRef$Failed to get address for Py_Initialize$Failed to get address for Py_NoSiteFlag$Failed to get address for Py_NoUserSiteDirectory$Failed to get address for Py_OptimizeFlag$Failed to get address for Py_SetPath$Failed to get address for Py_SetProgramName$Failed to get address for Py_SetPythonHome$Failed to get address for Py_UTF8Mode$Failed to get address for Py_UnbufferedStdioFlag$Failed to get address for Py_VerboseFlag$GetProcAddress$PyDict_GetItemString$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyList_New$PyLong_AsLong$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyRun_SimpleStringFlags$PySys_AddWarnOption$PySys_GetObject$PySys_SetArgvEx$PySys_SetObject$PySys_SetPath$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_BuildValue$Py_DecRef$Py_DecodeLocale$Py_DontWriteBytecodeFlag$Py_FileSystemDefaultEncoding$Py_Finalize$Py_FrozenFlag$Py_GetPath$Py_IgnoreEnvironmentFlag$Py_IncRef$Py_Initialize$Py_NoSiteFlag$Py_NoUserSiteDirectory$Py_OptimizeFlag$Py_SetPath$Py_SetProgramName$Py_SetPythonHome$Py_UTF8Mode$Py_UnbufferedStdioFlag$Py_VerboseFlag
                                                                                        • API String ID: 190572456-3109299426
                                                                                        • Opcode ID: 9e5338f17e9a06305e3f6e0c00f43c9f2351ab77f2791f85b3366b77a8fa4fe8
                                                                                        • Instruction ID: fe78e2559709000415b592360d5c842d86f3b96af817ae35b20097de14541810
                                                                                        • Opcode Fuzzy Hash: 9e5338f17e9a06305e3f6e0c00f43c9f2351ab77f2791f85b3366b77a8fa4fe8
                                                                                        • Instruction Fuzzy Hash: 6042C964A09F4791FB55FB0AAD40274E3A2EF14781BC45037CC1D0A368FF7EB5588A29
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$Window$Create$Move$ObjectSelect$#380BaseClientDialogDrawFontIndirectInfoParametersRectReleaseSystemTextUnits
                                                                                        • String ID: BUTTON$Close$EDIT$Failed to execute script '%ls' due to unhandled exception: %ls$STATIC
                                                                                        • API String ID: 2446303242-1601438679
                                                                                        • Opcode ID: 459a4d17a5d9d63fd32af7de9d21940b0e91a324c601fae87eb48516cdd5ea8c
                                                                                        • Instruction ID: 27bce5b2c29d24ecb9490351faedb4fc4fe5a452bdcb17d9b7cf554d99657dc0
                                                                                        • Opcode Fuzzy Hash: 459a4d17a5d9d63fd32af7de9d21940b0e91a324c601fae87eb48516cdd5ea8c
                                                                                        • Instruction Fuzzy Hash: 1DA15A36208B8187E7549F22E94479AF760F788B90F904126EF9D03B25CF3EE1A5CB54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                        • API String ID: 808467561-2761157908
                                                                                        • Opcode ID: ccfbaf94e8ba692c66e947d25492209142ad6238170979dce7e9a2c25c803b1f
                                                                                        • Instruction ID: 551a2f32d65e010469afa69667cad66627aafdb07d899e8410627ab3d5c1bb57
                                                                                        • Opcode Fuzzy Hash: ccfbaf94e8ba692c66e947d25492209142ad6238170979dce7e9a2c25c803b1f
                                                                                        • Instruction Fuzzy Hash: CFB2D472B182828BE7249F66DC407FDF7A1FB54388F845136DE1957A84EB3AA900CF54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,00007FF7285B269E,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B7507
                                                                                        • FormatMessageW.KERNEL32 ref: 00007FF7285B7536
                                                                                        • WideCharToMultiByte.KERNEL32 ref: 00007FF7285B758C
                                                                                          • Part of subcall function 00007FF7285B2620: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF7285B7774,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B2654
                                                                                          • Part of subcall function 00007FF7285B2620: MessageBoxW.USER32 ref: 00007FF7285B2730
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                                                                        • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                                                        • API String ID: 2920928814-2573406579
                                                                                        • Opcode ID: 029f836fef8ee5472c7679535fa4ba659228b0cadb04ffc4aa2330943ac4ddf3
                                                                                        • Instruction ID: a3645a7ac348c8a08a24f5b4eda7bfad08b4bdf92095c57566744f8048a24ca4
                                                                                        • Opcode Fuzzy Hash: 029f836fef8ee5472c7679535fa4ba659228b0cadb04ffc4aa2330943ac4ddf3
                                                                                        • Instruction Fuzzy Hash: 7B217171A08A4282F721AF12EC40376E265FB58385FC40136E95D83798EF3EE555CF28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 3140674995-0
                                                                                        • Opcode ID: ed99729a06427ffe8919d80707f0d22f85e2a1f7f16501b693ecc562f35910ed
                                                                                        • Instruction ID: abcdce5a90a8eaf1c91b809d3946200f81131f1dbb6ca091cf8795ce764d9b4c
                                                                                        • Opcode Fuzzy Hash: ed99729a06427ffe8919d80707f0d22f85e2a1f7f16501b693ecc562f35910ed
                                                                                        • Instruction Fuzzy Hash: 21315072609A8186EB609FA1EC403EEF360FB94744F84403ADA4D47B98DF79D548CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 1239891234-0
                                                                                        • Opcode ID: be108ae6727a529d83f8885eb47159bd80851fd8c8093c6f980a4c1e93935562
                                                                                        • Instruction ID: 88f29ececab1f22cf5b63acc4b6186ef66dca4d35bebe453871747fb12d1a56b
                                                                                        • Opcode Fuzzy Hash: be108ae6727a529d83f8885eb47159bd80851fd8c8093c6f980a4c1e93935562
                                                                                        • Instruction Fuzzy Hash: 49315F32618B8186EB60DF66EC403AEF3A4FB84754F900136EA9D43B98DF39D5558F14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 2227656907-0
                                                                                        • Opcode ID: aa90af6a4a788c2c16a02cea0e9581d0bf20e05c721b47e02ac586f09149659d
                                                                                        • Instruction ID: 048d49747cd344cea66e2209bb3119911f94579cd1155c3ae6dfb7601ac587db
                                                                                        • Opcode Fuzzy Hash: aa90af6a4a788c2c16a02cea0e9581d0bf20e05c721b47e02ac586f09149659d
                                                                                        • Instruction Fuzzy Hash: 6BB19362B1869641EB61AB239C007BEE790EF44BE4F845133EE6D07B95DE3DE441CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcpy_s
                                                                                        • String ID:
                                                                                        • API String ID: 1502251526-0
                                                                                        • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                                                        • Instruction ID: f4be1525cfe064ff1cda050af7d19c5dbb05b9ff42ea7c78a1b174da424317b4
                                                                                        • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                                                        • Instruction Fuzzy Hash: F2C10272B1828687E724DF5AA8447AAF791F784B84F849136DF5E43784DA3EE801CB04
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionRaise_clrfp
                                                                                        • String ID:
                                                                                        • API String ID: 15204871-0
                                                                                        • Opcode ID: 100244ad11a5ca47b3e63d731413f73159be8c16d425433171175cfe94e11ddb
                                                                                        • Instruction ID: bcc2c3a4323a40edc01b6280fe5cae5a8e7057d136be449e346af3b9c3e1bb07
                                                                                        • Opcode Fuzzy Hash: 100244ad11a5ca47b3e63d731413f73159be8c16d425433171175cfe94e11ddb
                                                                                        • Instruction Fuzzy Hash: 32B15B73604B898AEB15DF2ACC46368BBA0F744F48F548922DE6D877A4CB3ED451CB14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFileFirst
                                                                                        • String ID:
                                                                                        • API String ID: 2295610775-0
                                                                                        • Opcode ID: 0e172d7ea5e890d92c6a2989d53da8e3c55f614dc17c23923d45aaf4937351c2
                                                                                        • Instruction ID: 6d02951a6f10cccbf5bcc21bd5a5a8b4ff810922f1abb2c5514e3d08c6bd3d16
                                                                                        • Opcode Fuzzy Hash: 0e172d7ea5e890d92c6a2989d53da8e3c55f614dc17c23923d45aaf4937351c2
                                                                                        • Instruction Fuzzy Hash: BAF08122A1868187E7619F65EC84766F390FB84764F840236EA6D067D8DF3DD019CE14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $
                                                                                        • API String ID: 0-227171996
                                                                                        • Opcode ID: f5e1524899c56bc23ad3890ea476fd64461aaca1c1c6cf088a54164d3a5803aa
                                                                                        • Instruction ID: 05be2a17a01dd03df89bc0794d87716702e6656da31bda89ef4c7526e828539e
                                                                                        • Opcode Fuzzy Hash: f5e1524899c56bc23ad3890ea476fd64461aaca1c1c6cf088a54164d3a5803aa
                                                                                        • Instruction Fuzzy Hash: F8E1A33290864681EB68AE2B8C5017DE7A0FB54F48F945137DA0E07694DF2BE842CF78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: e+000$gfff
                                                                                        • API String ID: 0-3030954782
                                                                                        • Opcode ID: fc16f48a51adf8395f54aceaf0b9db76d004ae62db191d73de727a3be8067e6d
                                                                                        • Instruction ID: a836cebc19c8f71b5c4ca7a572d1ebdd67987e3983b69665fee0bbb6ca1e8d3e
                                                                                        • Opcode Fuzzy Hash: fc16f48a51adf8395f54aceaf0b9db76d004ae62db191d73de727a3be8067e6d
                                                                                        • Instruction Fuzzy Hash: 9E515862B186C546EB249A369C00769F791E744B94F889233CAA887AC5CF3EE4408F24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentFeaturePresentProcessProcessor
                                                                                        • String ID:
                                                                                        • API String ID: 1010374628-0
                                                                                        • Opcode ID: 7b8013cb37c9a7e222243b3c4de35810e5b54fec65f32173fc6ad4bf32c7969a
                                                                                        • Instruction ID: 7f6eb3bfc77fd4c32201b1ae9ad5483a4e27920e1139e4445190cf7cf563fb42
                                                                                        • Opcode Fuzzy Hash: 7b8013cb37c9a7e222243b3c4de35810e5b54fec65f32173fc6ad4bf32c7969a
                                                                                        • Instruction Fuzzy Hash: BD029E22A0D65281FB55BB139C00279E690EF46BA0FD44637DD6D46BD2DE7FA8018F38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: gfffffff
                                                                                        • API String ID: 0-1523873471
                                                                                        • Opcode ID: 24567b7b7ad9cc25883cfe86a0af8cdb31fb8148e1153fa934f37376d4be2ae6
                                                                                        • Instruction ID: cbc15be8ac81e90fe7aff1ed2bc370c63f354af4c81f6b0270d3deb6379fec1c
                                                                                        • Opcode Fuzzy Hash: 24567b7b7ad9cc25883cfe86a0af8cdb31fb8148e1153fa934f37376d4be2ae6
                                                                                        • Instruction Fuzzy Hash: 7AA14862A187C546FB21DF2A9C107A9FBA0EB55B84F448132DE4D477A5DA3ED801CF24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: TMP
                                                                                        • API String ID: 3215553584-3125297090
                                                                                        • Opcode ID: 47ea1f6def5f518426b9f240e4a0d08a7fd0549338a13be3274c745da13762ef
                                                                                        • Instruction ID: 53d9b71039b2ab4a72163895d367a0366bcb1ad23f14a9c63b914b6bd3be5c95
                                                                                        • Opcode Fuzzy Hash: 47ea1f6def5f518426b9f240e4a0d08a7fd0549338a13be3274c745da13762ef
                                                                                        • Instruction Fuzzy Hash: FC519011B0864241FB64BA2B5D116BAD291EF54BC4FC84036DE0D57B92EE3EE4428F38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: HeapProcess
                                                                                        • String ID:
                                                                                        • API String ID: 54951025-0
                                                                                        • Opcode ID: 2f1302fce1481fbe20b13d751b936209868e95a9271a4e16dc4ced5aa84efd4b
                                                                                        • Instruction ID: 4567f4d80d4a6d3174bd3e8312c16555e05eebe3cd5fe70bbf33fca057d99054
                                                                                        • Opcode Fuzzy Hash: 2f1302fce1481fbe20b13d751b936209868e95a9271a4e16dc4ced5aa84efd4b
                                                                                        • Instruction Fuzzy Hash: E5B09220E07A02D2EF493B626C82214A3A4BF58740FD8103AC40C80320DF2D20BA6B25
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 740f364038b0a02b74aefc6a4002d605bb8d66e8ece03474d19f7dcd3f76f926
                                                                                        • Instruction ID: 420bf1fbb63ce490e89bb1d0ed05e70b8bae89ea49d4e8fcc13ac7f629eca81a
                                                                                        • Opcode Fuzzy Hash: 740f364038b0a02b74aefc6a4002d605bb8d66e8ece03474d19f7dcd3f76f926
                                                                                        • Instruction Fuzzy Hash: F2D1C526A0864685EB68AE278C4027DE7A1EB05F48F944237CE0D47694DF3ED881CF78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 41c2dd31deb4208f6a64af358637e949a31ffee90b73308347fda93b72d461a0
                                                                                        • Instruction ID: d11f439f2397d09681e9370395a0be3ef2252584bbdcfe628d3f9a9b698a38bf
                                                                                        • Opcode Fuzzy Hash: 41c2dd31deb4208f6a64af358637e949a31ffee90b73308347fda93b72d461a0
                                                                                        • Instruction Fuzzy Hash: AEC194722141E04BE2C9EB29E86947EB391F79934DBD4503BEB8747B89C63CE414DB60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 081855a1139a905c050f004adae9c343e6fe2e6a907cc23c5706cce6c129a0ff
                                                                                        • Instruction ID: 8f45304f4677ed6fb667659d0a608a3fe508ce5f2f14398e8fdd209cb356f7cd
                                                                                        • Opcode Fuzzy Hash: 081855a1139a905c050f004adae9c343e6fe2e6a907cc23c5706cce6c129a0ff
                                                                                        • Instruction Fuzzy Hash: 33B14A7690878585EB649F2A8C5022CBBA0E745F88FA85137CB4E47395DF3AD441CF39
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c73884664ec6463b3ef8ba4e0c781f3417535d3b4587aef21b1cb5b9e685f8d4
                                                                                        • Instruction ID: 11c8d1e62cab3d7ad3c15b05d9b915f618d075dafc25ef294c8f8830f557b4ff
                                                                                        • Opcode Fuzzy Hash: c73884664ec6463b3ef8ba4e0c781f3417535d3b4587aef21b1cb5b9e685f8d4
                                                                                        • Instruction Fuzzy Hash: B081B572A0C78185E7A4EB179C4037AEA91FB45794F944236DA9D87B95CF3EF4008F24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: 3bf38bb552e652050a5a4325e5c4404943d37f9760ac8566a9e89c8f0e7421a3
                                                                                        • Instruction ID: 06c6dafcb6a609104398ec31324cba1a5c566be06de99c55eade330befca98b1
                                                                                        • Opcode Fuzzy Hash: 3bf38bb552e652050a5a4325e5c4404943d37f9760ac8566a9e89c8f0e7421a3
                                                                                        • Instruction Fuzzy Hash: F961D822E1826246F764EA2A8C50779E681EF40371FD44237DE7E466D5DE7FE840CE24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 867914ff4df0b6b44d704adc42bbe88cde9096fdc707783f05752eff833c7ffe
                                                                                        • Instruction ID: 71024ad74e2bc03cb6b11f56d396f76ff1960374edef4dd3a4b4f2841e0b58e5
                                                                                        • Opcode Fuzzy Hash: 867914ff4df0b6b44d704adc42bbe88cde9096fdc707783f05752eff833c7ffe
                                                                                        • Instruction Fuzzy Hash: 18519976A58651C6E7249B2ACC40238F7A0EB65B58F644132CE4D57794CF3BE843CFA8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c32b4ddfd43473a216dec7aa9a0be5b617892f75f4149cffacdc7470c95e978f
                                                                                        • Instruction ID: ee2acf11ccb882b8df2ee20a79485b889d182343cd63d90d70743648de500498
                                                                                        • Opcode Fuzzy Hash: c32b4ddfd43473a216dec7aa9a0be5b617892f75f4149cffacdc7470c95e978f
                                                                                        • Instruction Fuzzy Hash: E6519376A1865186E7249B2ACC44238F7A0EF55B68F644132CE8D17795CB3BE843CFA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d861661aa08db629cc23cdca8c369b076586a2e450c00db1ba5d57a294e44a4f
                                                                                        • Instruction ID: 7c84ae612adecb876472f9d35dafea160ad554a9992177a1880e908cd578d870
                                                                                        • Opcode Fuzzy Hash: d861661aa08db629cc23cdca8c369b076586a2e450c00db1ba5d57a294e44a4f
                                                                                        • Instruction Fuzzy Hash: 4C518536A5865186E7249B2ACC44238F7A0FB65FA8F644132CE4D17794CB3BE843CF64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6b4a4146db3bd1fe649265067838c8b0d7c1a5e97031d62dd0eb31e0fdd0228e
                                                                                        • Instruction ID: 75d042f9e6c7996b3c361131de9ee2b6275a7b756b4fda0e045682feadf79be7
                                                                                        • Opcode Fuzzy Hash: 6b4a4146db3bd1fe649265067838c8b0d7c1a5e97031d62dd0eb31e0fdd0228e
                                                                                        • Instruction Fuzzy Hash: 5551B236A5865181EB249B2BCC4023CE7A1EB64F58FA44132CE4C57798DB3BE853CF64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 876697f8e8f5cbbdb44752562e3cb115d809b93d1bac5633a342ac63b65505f1
                                                                                        • Instruction ID: 492a991ebabcf317b49815190d36d5b603d182a8dc78e7667ea02f7f77b71fa0
                                                                                        • Opcode Fuzzy Hash: 876697f8e8f5cbbdb44752562e3cb115d809b93d1bac5633a342ac63b65505f1
                                                                                        • Instruction Fuzzy Hash: 12517F36A1865186E764DB2ACC4023CF7A1EF44B5CFA89132CA4D17795DB3BE842CF64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1de1d42fcd570761cca71ddda72003ed022ec41b6526507f8e47f89f031e3167
                                                                                        • Instruction ID: b78b29d2216715be36c8e28d207b40c26b9a336a5ba305a1aeb5274603e72b88
                                                                                        • Opcode Fuzzy Hash: 1de1d42fcd570761cca71ddda72003ed022ec41b6526507f8e47f89f031e3167
                                                                                        • Instruction Fuzzy Hash: A4517F36A5865186E7649F2ACC40238F7A1EF44F58FA44132DA4D17795CB3BE883CFA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                        • Instruction ID: 316963e84b1ef111e1830b210f01a6bf8a98186c6dd016163a2b77af3f146462
                                                                                        • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                        • Instruction Fuzzy Hash: 50413862C1964A44EB51999A0D047B9E780FF62BE0ED852B2CED9637C3DD0F2586CE34
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                                        • String ID:
                                                                                        • API String ID: 588628887-0
                                                                                        • Opcode ID: 3055bbfcbd61cc8eecc56a6f1cb99aabc05f55128e1d14a3269b82b5b7201aa7
                                                                                        • Instruction ID: 7e8abccb3997aa145b974527f2e1b7cdb504ae23e395325801d0269e55a46f00
                                                                                        • Opcode Fuzzy Hash: 3055bbfcbd61cc8eecc56a6f1cb99aabc05f55128e1d14a3269b82b5b7201aa7
                                                                                        • Instruction Fuzzy Hash: 8E41E062B14A5882EF54DF2ADD14569E3A1EB48FD0B899037DE0D8BB58EE3DD0428B14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ee4673de95ce1c3203f19ce9ce644468e75f80e7845f38315ddde02822e300f2
                                                                                        • Instruction ID: 083f32a7e302a7088cdf5af7445f053ad2a3a6b61088094aeedd3da6ae4d4c34
                                                                                        • Opcode Fuzzy Hash: ee4673de95ce1c3203f19ce9ce644468e75f80e7845f38315ddde02822e300f2
                                                                                        • Instruction Fuzzy Hash: AB31A672708B4241E764AF266C4013EE6D5EF84B90F94423EEA8E53BD6DF3DD1118E28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ea08c2437e4e3c4698eed2d9fd972e66d262d614c61166a858f736d4a7407d73
                                                                                        • Instruction ID: 2688e931fb80014fd48e5c0e3c9d66495b1c9b5955a62d666a17ead832fdcdaf
                                                                                        • Opcode Fuzzy Hash: ea08c2437e4e3c4698eed2d9fd972e66d262d614c61166a858f736d4a7407d73
                                                                                        • Instruction Fuzzy Hash: 1EF068717182558BEB98AF6DAC02629B7D0F7183C0F90803AD68D83B44D73D90508F18
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: deab79669d35d3f06de2a1b3ba32e81158c273845478c0e398c52fdc0538379a
                                                                                        • Instruction ID: 072645ec6286d21e0b66afc5281a64c0722f8ee5b98dd1a3b0080110ac65e34f
                                                                                        • Opcode Fuzzy Hash: deab79669d35d3f06de2a1b3ba32e81158c273845478c0e398c52fdc0538379a
                                                                                        • Instruction Fuzzy Hash: 20A0026190CC46D4EB45BB42EC50131E770FF60380BC41033F85D412A49F7EE450EB2A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                                        • API String ID: 190572456-2208601799
                                                                                        • Opcode ID: f2a63a6368bd24169675c041ca24025962e4e687bdbe2194ee438000f2696acf
                                                                                        • Instruction ID: 56e4c4951b0d9364c119d4ccc96a64d6d59f2a6d80b2b3d49713e80ee45a9b24
                                                                                        • Opcode Fuzzy Hash: f2a63a6368bd24169675c041ca24025962e4e687bdbe2194ee438000f2696acf
                                                                                        • Instruction Fuzzy Hash: 1CE1E9A4A0DB0391FB4AEB07BC50274E3A5EF25345BC45137DC1E06368EF7EB5588A29
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                                        • String ID: P%
                                                                                        • API String ID: 2147705588-2959514604
                                                                                        • Opcode ID: 2abf96d7e756ec95747b6225775113f5ca3bbb9c1d9d148edce5ba3104c9dbe9
                                                                                        • Instruction ID: 6dba3a26fc8033d02d12d2198395ebd770d19320c0cf769f35565c2bd14dedf6
                                                                                        • Opcode Fuzzy Hash: 2abf96d7e756ec95747b6225775113f5ca3bbb9c1d9d148edce5ba3104c9dbe9
                                                                                        • Instruction Fuzzy Hash: 085107266047A186D724AF26E8182BBF7A1F798B61F004122EFDE43785DF3DD085DB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: f$f$p$p$f
                                                                                        • API String ID: 3215553584-1325933183
                                                                                        • Opcode ID: 864902cbb2e935f55fbb0b0f358a3d1305b233c90ffe52d12db1516ed6b7c985
                                                                                        • Instruction ID: e9b3b79929a83ec48be715fd183a2715c7e07f6fda521901c68a566d9b23151b
                                                                                        • Opcode Fuzzy Hash: 864902cbb2e935f55fbb0b0f358a3d1305b233c90ffe52d12db1516ed6b7c985
                                                                                        • Instruction Fuzzy Hash: CE129165A0C14386FB64BA16EC5437AE2A1EF80754FC48137E699476C4CB3EE584CF78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message
                                                                                        • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                        • API String ID: 2030045667-3659356012
                                                                                        • Opcode ID: 081d1098d57967ce800edd8e98f68f2632d05ce576d96a8f6d6e4391c26efd03
                                                                                        • Instruction ID: b64ddf23d04384f2d5160619629fb6e9a053425045beff20aa2ae1ecc925de13
                                                                                        • Opcode Fuzzy Hash: 081d1098d57967ce800edd8e98f68f2632d05ce576d96a8f6d6e4391c26efd03
                                                                                        • Instruction Fuzzy Hash: CF418121A4864281EB54FB13EC412AAE3A0EF547D4FC44433DE4D07B59EE3EE542CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                        • String ID: csm$csm$csm
                                                                                        • API String ID: 849930591-393685449
                                                                                        • Opcode ID: 041d502785614f157d9e0dc40e6677f491242ac1b203480cf839ec3ef7e6c674
                                                                                        • Instruction ID: 6103f0fefd10887622c6c1092829c237ae456a8f99fbc261f087de1ed9a5bc0c
                                                                                        • Opcode Fuzzy Hash: 041d502785614f157d9e0dc40e6677f491242ac1b203480cf839ec3ef7e6c674
                                                                                        • Instruction Fuzzy Hash: F4E19472A087818AEB60AF66DC402ADF7A0FB65798F940136EE4D57B59CF3DE440CB14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FreeLibrary.KERNEL32(?,00000000,?,00007FF7285CE182,?,?,0000017F52E88EA8,00007FF7285CA253,?,?,?,00007FF7285CA14A,?,?,?,00007FF7285C54A2), ref: 00007FF7285CDF64
                                                                                        • GetProcAddress.KERNEL32(?,00000000,?,00007FF7285CE182,?,?,0000017F52E88EA8,00007FF7285CA253,?,?,?,00007FF7285CA14A,?,?,?,00007FF7285C54A2), ref: 00007FF7285CDF70
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressFreeLibraryProc
                                                                                        • String ID: api-ms-$ext-ms-
                                                                                        • API String ID: 3013587201-537541572
                                                                                        • Opcode ID: d8cc7062eaeb840b6a05769bf190717e46830e73a0557d63fb398ab5923ee7ee
                                                                                        • Instruction ID: f3538aab92d439fd5bc4d2384ec9bea6a9c9886059ac2e27c3885c5da143407b
                                                                                        • Opcode Fuzzy Hash: d8cc7062eaeb840b6a05769bf190717e46830e73a0557d63fb398ab5923ee7ee
                                                                                        • Instruction Fuzzy Hash: E941FC61B19A1281EB16EB179C00676E291FF04BA0F884137DD1D87788EF3EF8058E38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B76CF
                                                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B771F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide
                                                                                        • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                        • API String ID: 626452242-27947307
                                                                                        • Opcode ID: 29c5713369a821ffdf206052f52b70c9c71ca66087eebd3ab8d6d8eadb6ef28e
                                                                                        • Instruction ID: 934770d1f6db24a7c3e126d36e997ba25b8a443acd2a582b9f79e90df5aadf0e
                                                                                        • Opcode Fuzzy Hash: 29c5713369a821ffdf206052f52b70c9c71ca66087eebd3ab8d6d8eadb6ef28e
                                                                                        • Instruction Fuzzy Hash: 0E418E32A09B8282E720EF16EC4026AF7A5FB94790F984136DA8D47B98DF3DD455CB14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WideCharToMultiByte.KERNEL32(?,00007FF7285B36B9), ref: 00007FF7285B7BB1
                                                                                          • Part of subcall function 00007FF7285B2620: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF7285B7774,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B2654
                                                                                          • Part of subcall function 00007FF7285B2620: MessageBoxW.USER32 ref: 00007FF7285B2730
                                                                                        • WideCharToMultiByte.KERNEL32(?,00007FF7285B36B9), ref: 00007FF7285B7C25
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                        • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                        • API String ID: 3723044601-27947307
                                                                                        • Opcode ID: aab539b93ffeac37e32982e6298ac4f9f3ab9a0e846f993d4d23bb2dfd97e0ba
                                                                                        • Instruction ID: ae743e7d201bc3ebb0751ea1fe7457691fc39d46e4a83eb9da43c919e79de083
                                                                                        • Opcode Fuzzy Hash: aab539b93ffeac37e32982e6298ac4f9f3ab9a0e846f993d4d23bb2dfd97e0ba
                                                                                        • Instruction Fuzzy Hash: A4217E61A08B4285EB11EF17EC40179F661EB94B90FD84136DA5D43798EF7EE901CB28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: f$p$p
                                                                                        • API String ID: 3215553584-1995029353
                                                                                        • Opcode ID: 8b43f30c9b627f105c9440690760d813b6cbc2015482011a3dd154e3df4de9b0
                                                                                        • Instruction ID: 5464ea7387ce9ad129a7c4a3cfe762d74e0c5873f1dbf899b5495cd675dbb5aa
                                                                                        • Opcode Fuzzy Hash: 8b43f30c9b627f105c9440690760d813b6cbc2015482011a3dd154e3df4de9b0
                                                                                        • Instruction Fuzzy Hash: 98129F66A0C14386FB64BA16DC547B9F691FB40B52FC84037E68A476C4DB3EE5818F38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide
                                                                                        • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                                                        • API String ID: 626452242-876015163
                                                                                        • Opcode ID: a20b0b5ed8276b533e9075527801bd2e9cd7712b6a2c346206ed433b7f82c893
                                                                                        • Instruction ID: 918739a457b72e632fcaffec1c6ea082fb1c77a194343130118c172261551621
                                                                                        • Opcode Fuzzy Hash: a20b0b5ed8276b533e9075527801bd2e9cd7712b6a2c346206ed433b7f82c893
                                                                                        • Instruction Fuzzy Hash: FE41A332A08B82C6E710EF16EC40279E6A5FB94790F944136DE9D47BA8DF3DD411CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00007FF7285B7A60: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7285B26FB), ref: 00007FF7285B7A9A
                                                                                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF7285B67F1,?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B64FF
                                                                                          • Part of subcall function 00007FF7285B2770: MessageBoxW.USER32 ref: 00007FF7285B2845
                                                                                        Strings
                                                                                        • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF7285B6513
                                                                                        • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF7285B655A
                                                                                        • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF7285B64D6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                                        • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                                                        • API String ID: 1662231829-3498232454
                                                                                        • Opcode ID: 36c323d19424fe0ac76ca925b523eb1a2808b36d4a593579a88913e209ccb6ab
                                                                                        • Instruction ID: de9738b9ea8d1eac9b26b1f2034f2a407ea2c1dca48d9e593d4052d07708c124
                                                                                        • Opcode Fuzzy Hash: 36c323d19424fe0ac76ca925b523eb1a2808b36d4a593579a88913e209ccb6ab
                                                                                        • Instruction Fuzzy Hash: C4319311B1868241FB24B7279D153BAD1D1EFA87C0FC44033DA4E427DEEE2EE5048E28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF7285BD1CA,?,?,?,00007FF7285BCEBC,?,?,00000001,00007FF7285BCAD9), ref: 00007FF7285BCF9D
                                                                                        • GetLastError.KERNEL32(?,?,?,00007FF7285BD1CA,?,?,?,00007FF7285BCEBC,?,?,00000001,00007FF7285BCAD9), ref: 00007FF7285BCFAB
                                                                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF7285BD1CA,?,?,?,00007FF7285BCEBC,?,?,00000001,00007FF7285BCAD9), ref: 00007FF7285BCFD5
                                                                                        • FreeLibrary.KERNEL32(?,?,?,00007FF7285BD1CA,?,?,?,00007FF7285BCEBC,?,?,00000001,00007FF7285BCAD9), ref: 00007FF7285BD01B
                                                                                        • GetProcAddress.KERNEL32(?,?,?,00007FF7285BD1CA,?,?,?,00007FF7285BCEBC,?,?,00000001,00007FF7285BCAD9), ref: 00007FF7285BD027
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                        • String ID: api-ms-
                                                                                        • API String ID: 2559590344-2084034818
                                                                                        • Opcode ID: 96cc8d1137d818a2009be7de16c2cee15406677aaf285b7c4d33305375866f21
                                                                                        • Instruction ID: 8a267c5c0f7c3217f91d141b1df13d5d20776174c9eabed8aba6407751b7d6b3
                                                                                        • Opcode Fuzzy Hash: 96cc8d1137d818a2009be7de16c2cee15406677aaf285b7c4d33305375866f21
                                                                                        • Instruction Fuzzy Hash: 8931B421A1A64691FF52AB03AC00675E394FF58BA0F990536DD1D46388EF3EF4458F28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7285B26FB), ref: 00007FF7285B7A9A
                                                                                          • Part of subcall function 00007FF7285B2620: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF7285B7774,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B2654
                                                                                          • Part of subcall function 00007FF7285B2620: MessageBoxW.USER32 ref: 00007FF7285B2730
                                                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7285B26FB), ref: 00007FF7285B7B20
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                        • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                                                        • API String ID: 3723044601-876015163
                                                                                        • Opcode ID: ef0c7189470ede6921ef3de76a81d580bff1fc53629992aced72f99ea96e9165
                                                                                        • Instruction ID: 77973a3f6daaaeca408d7c061b68b465745bbe9a229efaeb44cd83ffed3a9cf8
                                                                                        • Opcode Fuzzy Hash: ef0c7189470ede6921ef3de76a81d580bff1fc53629992aced72f99ea96e9165
                                                                                        • Instruction Fuzzy Hash: 0D217322B08A4281EB51EB16FC0016AE361FF947C4F984132DF5C83BA9EF2DD5418F14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F,?,?,?,00007FF7285C9343), ref: 00007FF7285CA65F
                                                                                        • FlsGetValue.KERNEL32(?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F,?,?,?,00007FF7285C9343), ref: 00007FF7285CA674
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F,?,?,?,00007FF7285C9343), ref: 00007FF7285CA695
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F,?,?,?,00007FF7285C9343), ref: 00007FF7285CA6C2
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F,?,?,?,00007FF7285C9343), ref: 00007FF7285CA6D3
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F,?,?,?,00007FF7285C9343), ref: 00007FF7285CA6E4
                                                                                        • SetLastError.KERNEL32(?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F,?,?,?,00007FF7285C9343), ref: 00007FF7285CA6FF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 2506987500-0
                                                                                        • Opcode ID: d365506b468abd5d7bf7b756cf0f7b1bb9906f882674b6fc52fc0ea6e22322e1
                                                                                        • Instruction ID: 7f89e042e36f026b36aa0f89d18f0f689bc1874913a6f9963f87b7eb6a0a8abf
                                                                                        • Opcode Fuzzy Hash: d365506b468abd5d7bf7b756cf0f7b1bb9906f882674b6fc52fc0ea6e22322e1
                                                                                        • Instruction Fuzzy Hash: C0217F60E0C28242FB5A77279E51139E651DF447E0FD40637E83E076D6DE2EB4A04E38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                        • String ID: CONOUT$
                                                                                        • API String ID: 3230265001-3130406586
                                                                                        • Opcode ID: 8e0e590b76c227ed4e0945dd3cc989df51f43b4687c0318c0d05d3449c58233d
                                                                                        • Instruction ID: 4894c7b8a0c97753927dd7abc10bd5e3d1c3776aa1e8f967654ae16a4594964d
                                                                                        • Opcode Fuzzy Hash: 8e0e590b76c227ed4e0945dd3cc989df51f43b4687c0318c0d05d3449c58233d
                                                                                        • Instruction Fuzzy Hash: 7011B121A18B4286E350AB57EC54329F2A0FB88BE4F840236EE2D83794DF3DD510CB18
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,?,00007FF7285C447D,?,?,?,?,00007FF7285CDDD7,?,?,00000000,00007FF7285CA8E6,?,?,?), ref: 00007FF7285CA7D7
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285C447D,?,?,?,?,00007FF7285CDDD7,?,?,00000000,00007FF7285CA8E6,?,?,?), ref: 00007FF7285CA80D
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285C447D,?,?,?,?,00007FF7285CDDD7,?,?,00000000,00007FF7285CA8E6,?,?,?), ref: 00007FF7285CA83A
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285C447D,?,?,?,?,00007FF7285CDDD7,?,?,00000000,00007FF7285CA8E6,?,?,?), ref: 00007FF7285CA84B
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285C447D,?,?,?,?,00007FF7285CDDD7,?,?,00000000,00007FF7285CA8E6,?,?,?), ref: 00007FF7285CA85C
                                                                                        • SetLastError.KERNEL32(?,?,?,00007FF7285C447D,?,?,?,?,00007FF7285CDDD7,?,?,00000000,00007FF7285CA8E6,?,?,?), ref: 00007FF7285CA877
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value$ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 2506987500-0
                                                                                        • Opcode ID: 888322ce7986a6c73fe15de5a31f45c15dfcf99cac4858416ed701125ecddacf
                                                                                        • Instruction ID: 488c472e7cf2b59142a9416fec2555658c4d29b2dd9c5262d0bfae2e507a60ab
                                                                                        • Opcode Fuzzy Hash: 888322ce7986a6c73fe15de5a31f45c15dfcf99cac4858416ed701125ecddacf
                                                                                        • Instruction Fuzzy Hash: B5115B60E0C28242FB5A7727AE51179E551DF447F0F844236E93E077D6DE2EB4228E38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                        • String ID: csm$f
                                                                                        • API String ID: 2395640692-629598281
                                                                                        • Opcode ID: 752f63a6eb654042196f5a98f7ed0cc27864ab03d65b16a783a14cfa4978e18e
                                                                                        • Instruction ID: ee507f5f1fa5e006e2e8be58b8df866e5a3df85ec1b3a8f9c18d82d19aa59c1b
                                                                                        • Opcode Fuzzy Hash: 752f63a6eb654042196f5a98f7ed0cc27864ab03d65b16a783a14cfa4978e18e
                                                                                        • Instruction Fuzzy Hash: 1651D632A1960286F714EB16DC40A29F755FB64B84F908132EE5A5374CDF3AED42CB1C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                                        • String ID: Unhandled exception in script
                                                                                        • API String ID: 3081866767-2699770090
                                                                                        • Opcode ID: c77eb6da1437d11355308ffd2f8c7ab1623b37de00385a783310635bce07de12
                                                                                        • Instruction ID: edb54603fcba500fd4dfad215e9505309f949ac52e7f37610761c9cf7f6fe0df
                                                                                        • Opcode Fuzzy Hash: c77eb6da1437d11355308ffd2f8c7ab1623b37de00385a783310635bce07de12
                                                                                        • Instruction Fuzzy Hash: 48314272609A8289EB24EF62EC552F9E360FF48784F840136EA4D4BB59DF3DD145CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,00007FF7285B7774,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B2654
                                                                                          • Part of subcall function 00007FF7285B74E0: GetLastError.KERNEL32(00000000,00007FF7285B269E,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B7507
                                                                                          • Part of subcall function 00007FF7285B74E0: FormatMessageW.KERNEL32 ref: 00007FF7285B7536
                                                                                          • Part of subcall function 00007FF7285B7A60: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7285B26FB), ref: 00007FF7285B7A9A
                                                                                        • MessageBoxW.USER32 ref: 00007FF7285B2730
                                                                                        • MessageBoxA.USER32 ref: 00007FF7285B274C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                                                                                        • String ID: %s%s: %s$Fatal error detected
                                                                                        • API String ID: 2806210788-2410924014
                                                                                        • Opcode ID: 7890d9f144e33e33d69a38586b169397518973d2a5b1a440a20cff3164d3e9e8
                                                                                        • Instruction ID: b7ef6cbd723005906c9f81e6e2913be9f580deda13e00595fe36891c64127484
                                                                                        • Opcode Fuzzy Hash: 7890d9f144e33e33d69a38586b169397518973d2a5b1a440a20cff3164d3e9e8
                                                                                        • Instruction Fuzzy Hash: D7317072628A8182E720AB11EC506DAE364FF94784F804037EA8D02A99DF3DD245CF58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                        • API String ID: 4061214504-1276376045
                                                                                        • Opcode ID: 1edae9836d644cf3f37344bb8067f5d3e72c30a74e7bf89e7e9475504bb25611
                                                                                        • Instruction ID: 78353d9f2855a21ec3e53420edff58fddef66d0b7a2c474bc21980a31cf7e2d1
                                                                                        • Opcode Fuzzy Hash: 1edae9836d644cf3f37344bb8067f5d3e72c30a74e7bf89e7e9475504bb25611
                                                                                        • Instruction Fuzzy Hash: 6AF06261A19A0281EB54AB26EC4533AD321EF897A2FD40637D97D456F4CF3ED048CF28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _set_statfp
                                                                                        • String ID:
                                                                                        • API String ID: 1156100317-0
                                                                                        • Opcode ID: 69d38c35bd33e64192705e47d806ebaffe6519085bb8d16871af39b095092657
                                                                                        • Instruction ID: 690cb35614962d1c6b92ba4d1d13f7ad0e2b671421a37997e3f02cedc91b5a2f
                                                                                        • Opcode Fuzzy Hash: 69d38c35bd33e64192705e47d806ebaffe6519085bb8d16871af39b095092657
                                                                                        • Instruction Fuzzy Hash: 2C11E322E0CA4315F7543166DC52375E042EF55B74FC48E36ED7E062E6CE2EA8448928
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FlsGetValue.KERNEL32(?,?,?,00007FF7285C9AA3,?,?,00000000,00007FF7285C9D3E,?,?,?,?,?,00007FF7285C221C), ref: 00007FF7285CA8AF
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285C9AA3,?,?,00000000,00007FF7285C9D3E,?,?,?,?,?,00007FF7285C221C), ref: 00007FF7285CA8CE
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285C9AA3,?,?,00000000,00007FF7285C9D3E,?,?,?,?,?,00007FF7285C221C), ref: 00007FF7285CA8F6
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285C9AA3,?,?,00000000,00007FF7285C9D3E,?,?,?,?,?,00007FF7285C221C), ref: 00007FF7285CA907
                                                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7285C9AA3,?,?,00000000,00007FF7285C9D3E,?,?,?,?,?,00007FF7285C221C), ref: 00007FF7285CA918
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value
                                                                                        • String ID:
                                                                                        • API String ID: 3702945584-0
                                                                                        • Opcode ID: df4c9619382c0808ccd49772ea9745aa54de0781784512e589dc92a21757168f
                                                                                        • Instruction ID: 6d294bb8a51874084d682ce318abadb8916ae5b1e734667a8247f1c3acc9ecfd
                                                                                        • Opcode Fuzzy Hash: df4c9619382c0808ccd49772ea9745aa54de0781784512e589dc92a21757168f
                                                                                        • Instruction Fuzzy Hash: 5D118CA0E0D64201FB997327AD42179E652DF447E0F884336E83D067D6DE2EB4628E38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F), ref: 00007FF7285CA735
                                                                                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F), ref: 00007FF7285CA754
                                                                                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F), ref: 00007FF7285CA77C
                                                                                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F), ref: 00007FF7285CA78D
                                                                                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7285D2463,?,?,?,00007FF7285CCBBC,?,?,00000000,00007FF7285C3A8F), ref: 00007FF7285CA79E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value
                                                                                        • String ID:
                                                                                        • API String ID: 3702945584-0
                                                                                        • Opcode ID: 5534cc39d97a85c6b77ba5fac8e208664eac32ea517946195010e1e52ad1b8f1
                                                                                        • Instruction ID: 66b519a0511370b6d6b9be2931e001826921b0ee30eccc4194e9481e16d052e1
                                                                                        • Opcode Fuzzy Hash: 5534cc39d97a85c6b77ba5fac8e208664eac32ea517946195010e1e52ad1b8f1
                                                                                        • Instruction Fuzzy Hash: B5111CA4E0C24305FB5976378C11179D592DF457A0E880737E93D0A2C2DE2EB4654E79
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                        • API String ID: 3215553584-1196891531
                                                                                        • Opcode ID: 04f77fab494744c2c515884d2b3c345e4279dac145e4d051e3529eeeffec7512
                                                                                        • Instruction ID: 10619db1d3d78631994db03ff4f9531d27df9816f30f7357fe6889a507b80df7
                                                                                        • Opcode Fuzzy Hash: 04f77fab494744c2c515884d2b3c345e4279dac145e4d051e3529eeeffec7512
                                                                                        • Instruction Fuzzy Hash: 9F81C676E0C24396FB646E279D50278F790EB11B44FD54033CA0997A85CBAFE9018F79
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallEncodePointerTranslator
                                                                                        • String ID: MOC$RCC
                                                                                        • API String ID: 3544855599-2084237596
                                                                                        • Opcode ID: 6cf636c1d413b9b1a8fe847baa594964b2e94e970a9ab49fc3c7a486a408bf4b
                                                                                        • Instruction ID: c33b345980100004c16e78e56a0e683505d7aed1efdc020d1bf22bddf6fe83c4
                                                                                        • Opcode Fuzzy Hash: 6cf636c1d413b9b1a8fe847baa594964b2e94e970a9ab49fc3c7a486a408bf4b
                                                                                        • Instruction Fuzzy Hash: C3617F36A08B458AEB109F66D8403ADF7A0FB54B88F584236EF4D17B98CF39E445CB54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                        • String ID: csm$csm
                                                                                        • API String ID: 3896166516-3733052814
                                                                                        • Opcode ID: 15a90b008ee0b5328ce42465ae6c6f27eb603fbbd906650bc51354757df09ebd
                                                                                        • Instruction ID: a80411d2c2f0ce8c47cc4f9eb3174d2a96e9e580382f477d72d1b97bc50b30f6
                                                                                        • Opcode Fuzzy Hash: 15a90b008ee0b5328ce42465ae6c6f27eb603fbbd906650bc51354757df09ebd
                                                                                        • Instruction Fuzzy Hash: 7B51A17290868286EB70AF129D44368F7A0FB64B95F984136DA4C47BD9DF3DF4508F18
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$ByteCharMultiWide
                                                                                        • String ID: %s%s: %s$Fatal error detected
                                                                                        • API String ID: 1878133881-2410924014
                                                                                        • Opcode ID: 4ccfa1ca3bcae5acffff1ea197f60ccb63abed4ad3799bdff7ceda7eadf1df34
                                                                                        • Instruction ID: f5a8db318d986dd3df7347f18e44d709208b147db0aa8298ebc18610f518314d
                                                                                        • Opcode Fuzzy Hash: 4ccfa1ca3bcae5acffff1ea197f60ccb63abed4ad3799bdff7ceda7eadf1df34
                                                                                        • Instruction Fuzzy Hash: 4C317272628A8191EB20E711EC516EAE364FF94784FC04037EA8D46A99DF3DD345CF68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleFileNameW.KERNEL32(?,00007FF7285B36B9), ref: 00007FF7285B3BF1
                                                                                          • Part of subcall function 00007FF7285B2620: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF7285B7774,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B2654
                                                                                          • Part of subcall function 00007FF7285B2620: MessageBoxW.USER32 ref: 00007FF7285B2730
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastMessageModuleName
                                                                                        • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                                                        • API String ID: 2581892565-1977442011
                                                                                        • Opcode ID: 1e1fb772b1588bb2ef8aa65086850d6655ce62306cfd8bfdc61953077b8dd8c7
                                                                                        • Instruction ID: 0ba5a008f4c12d3b44306c2e28d969a939dde721f5f2e5a95cdc3342a031ba7b
                                                                                        • Opcode Fuzzy Hash: 1e1fb772b1588bb2ef8aa65086850d6655ce62306cfd8bfdc61953077b8dd8c7
                                                                                        • Instruction Fuzzy Hash: 98018820B1968250FB21B712DC053FAD291EF68384FC40433E84D8639AEE6EE555CF28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                        • String ID:
                                                                                        • API String ID: 2718003287-0
                                                                                        • Opcode ID: 1e365f9b30df03f18385238fa5722fca72bc799989c9a48dcea0a3fe118199c6
                                                                                        • Instruction ID: 37ff0296e8ccda0ce497a2feddf1b47b298b712a68b9ea1746532bf21fe2e36f
                                                                                        • Opcode Fuzzy Hash: 1e365f9b30df03f18385238fa5722fca72bc799989c9a48dcea0a3fe118199c6
                                                                                        • Instruction Fuzzy Hash: A9D10532B18A8589E711DF76DC402ACB7B1FB44B98B804136CF5E57B99DE3AD016CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: LongWindow$DialogInvalidateRect
                                                                                        • String ID:
                                                                                        • API String ID: 1956198572-0
                                                                                        • Opcode ID: 162ef6909b0da24e61350fefbcaa0130b5f771c4d53ef42d88aea1c24daf7f6c
                                                                                        • Instruction ID: b3c910324e90b6f0d378926c8c73109524c6cfbc932d622bcfcdf9cedba9c539
                                                                                        • Opcode Fuzzy Hash: 162ef6909b0da24e61350fefbcaa0130b5f771c4d53ef42d88aea1c24daf7f6c
                                                                                        • Instruction Fuzzy Hash: 6B110C22E1814242F791A76BED443BAD292EF997C0FD45032FD4907B8DCE3ED4D18A28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                        • String ID:
                                                                                        • API String ID: 2933794660-0
                                                                                        • Opcode ID: 6f2ab88599309ed85d1430460dcf5b5c4b0e5279fe268d41b3c0937ed12eb80b
                                                                                        • Instruction ID: 0320afeb1dd8a7b7ad10ac6d4ff225990e0bf0da51335828176adb38d0c3ac2e
                                                                                        • Opcode Fuzzy Hash: 6f2ab88599309ed85d1430460dcf5b5c4b0e5279fe268d41b3c0937ed12eb80b
                                                                                        • Instruction Fuzzy Hash: 36117322B14F0289EB00DF61EC442B9B3A4F718758F841D32EE6D46764DF79D1A48794
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                        • String ID: ?
                                                                                        • API String ID: 1286766494-1684325040
                                                                                        • Opcode ID: 52680a59223a085ee97f839467cc497833a0271fa4472f3ef08586064223ff36
                                                                                        • Instruction ID: ce45e0a0195cbe8c654c48c26c9165285b2cad44e52bae68ebba818da0aa98d8
                                                                                        • Opcode Fuzzy Hash: 52680a59223a085ee97f839467cc497833a0271fa4472f3ef08586064223ff36
                                                                                        • Instruction Fuzzy Hash: 81410C12A0828256FB68BB179C01379D690EF907A4F948236EE6C07BD5DF3ED481CF15
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7285C7ECE
                                                                                          • Part of subcall function 00007FF7285C9E48: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E5E
                                                                                          • Part of subcall function 00007FF7285C9E48: GetLastError.KERNEL32(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E68
                                                                                        • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF7285BB135), ref: 00007FF7285C7EEC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLanguagesLastModuleNamePreferredRestoreThread_invalid_parameter_noinfo
                                                                                        • String ID: C:\Users\user~1\AppData\Local\Temp\D89C.exe
                                                                                        • API String ID: 2553983749-799679379
                                                                                        • Opcode ID: 20e0fa1cddfcb9b50fa612d7809b1235543b267f8bf6d467ddf7fa8b8e985724
                                                                                        • Instruction ID: e0848cd56a8363673fc4f4c416d29bf3adbbc3c48caaf195ae72ccca0c82c60d
                                                                                        • Opcode Fuzzy Hash: 20e0fa1cddfcb9b50fa612d7809b1235543b267f8bf6d467ddf7fa8b8e985724
                                                                                        • Instruction Fuzzy Hash: 49416D32A08B1285E715AF269C801B9E794EB45780B944037EA4E43B85DF3EE885CF78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastWrite
                                                                                        • String ID: U
                                                                                        • API String ID: 442123175-4171548499
                                                                                        • Opcode ID: 7853f05ac379f521114fefc1a42187cdb8ba925dbe71da0877b6f38df8d0512d
                                                                                        • Instruction ID: b462d49c938f52893d6bcd85e11a5b6ec9382c7d45ff4ededb499e1b46d20e02
                                                                                        • Opcode Fuzzy Hash: 7853f05ac379f521114fefc1a42187cdb8ba925dbe71da0877b6f38df8d0512d
                                                                                        • Instruction Fuzzy Hash: 5541B622618A4185EB20DF66EC443A9F761FB94794F804032EE8D87798DF3DD441CF64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentDirectory
                                                                                        • String ID: :
                                                                                        • API String ID: 1611563598-336475711
                                                                                        • Opcode ID: 97357a3e310543c92f49bcd053fa19b46c479768ab08e8a06ccb93066c69184d
                                                                                        • Instruction ID: 705fdf52112027ee327d37ed43c7f81e9f0435820df2cc3621723249f14a4b8a
                                                                                        • Opcode Fuzzy Hash: 97357a3e310543c92f49bcd053fa19b46c479768ab08e8a06ccb93066c69184d
                                                                                        • Instruction Fuzzy Hash: BD21A5B2A0868181EB21AB16DC4527DE3B1FB84B44FC54036DA8D43684DF7EE985CF79
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$ByteCharMultiWide
                                                                                        • String ID: Fatal error detected
                                                                                        • API String ID: 1878133881-4025702859
                                                                                        • Opcode ID: 467762ab5f403c00d0413d4f15cd763011442619e8d5336c18fe6ceaac1fee72
                                                                                        • Instruction ID: 121e27e106c7044ac4f28ec002f49ce40c15ff717620f33f00e80cc630900f57
                                                                                        • Opcode Fuzzy Hash: 467762ab5f403c00d0413d4f15cd763011442619e8d5336c18fe6ceaac1fee72
                                                                                        • Instruction Fuzzy Hash: 0021A67262868192E721E712EC506EAE364FF94784FC01037EA8D47A69DF3DD255CF28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$ByteCharMultiWide
                                                                                        • String ID: Error detected
                                                                                        • API String ID: 1878133881-3513342764
                                                                                        • Opcode ID: 3a752796a53e4bc79ccde23300fb76c48695a964a89870303d0a97fe25c8ba30
                                                                                        • Instruction ID: c611bfef200b77471150051e8db8b4c93ff700edf80a91ea10ef4e52299e9fbf
                                                                                        • Opcode Fuzzy Hash: 3a752796a53e4bc79ccde23300fb76c48695a964a89870303d0a97fe25c8ba30
                                                                                        • Instruction Fuzzy Hash: F221A67262868191EB21E711EC506EAE364FF94784FC01037EA8D47A59DF3DD215CF28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFileHeaderRaise
                                                                                        • String ID: csm
                                                                                        • API String ID: 2573137834-1018135373
                                                                                        • Opcode ID: 0a7d407d7729a8694e7779ca2a1de00754ab8488b643d7346c0eaced0571dbb1
                                                                                        • Instruction ID: b11064aac1bd39e3c829e6e08ad78530f5f73666bd6d5720fea84cfc9222e798
                                                                                        • Opcode Fuzzy Hash: 0a7d407d7729a8694e7779ca2a1de00754ab8488b643d7346c0eaced0571dbb1
                                                                                        • Instruction Fuzzy Hash: 0A113D32608B8582EB519F16F84026DF7A4FB98B94F584231EE8D07B68DF3ED5518B04
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000010.00000002.3817111150.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000010.00000002.3816659644.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3817904865.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3818416091.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000010.00000002.3819441876.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_16_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: DriveType_invalid_parameter_noinfo
                                                                                        • String ID: :
                                                                                        • API String ID: 2595371189-336475711
                                                                                        • Opcode ID: 088d6e29a3b0fed2a997de7a9fe2f09f1c5d5ef028721ffa5e057cac36b0a100
                                                                                        • Instruction ID: 799965556214bcba00d27ccaf41f1e10078aca031eaae71407451a1dc411dc33
                                                                                        • Opcode Fuzzy Hash: 088d6e29a3b0fed2a997de7a9fe2f09f1c5d5ef028721ffa5e057cac36b0a100
                                                                                        • Instruction Fuzzy Hash: 8801B16191824286FB21BB629C5127AE3A0EF44B04FC40037D54D46692DF3EE544CE38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Execution Graph

                                                                                        Execution Coverage:6.5%
                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                        Signature Coverage:0%
                                                                                        Total number of Nodes:31
                                                                                        Total number of Limit Nodes:5
                                                                                        execution_graph 16347 1a8d4f8 16348 1a8d53e GetCurrentProcess 16347->16348 16350 1a8d589 16348->16350 16351 1a8d590 GetCurrentThread 16348->16351 16350->16351 16352 1a8d5cd GetCurrentProcess 16351->16352 16353 1a8d5c6 16351->16353 16354 1a8d603 16352->16354 16353->16352 16355 1a8d62b GetCurrentThreadId 16354->16355 16356 1a8d65c 16355->16356 16357 1a846f0 16358 1a8470c 16357->16358 16359 1a8472c 16358->16359 16362 1a848a8 16358->16362 16368 1a84871 16358->16368 16363 1a8486d 16362->16363 16365 1a848b6 16362->16365 16374 1a8496f 16363->16374 16378 1a84980 16363->16378 16365->16359 16369 1a8487a 16368->16369 16371 1a848d0 16368->16371 16372 1a8496f CreateActCtxA 16369->16372 16373 1a84980 CreateActCtxA 16369->16373 16370 1a8489f 16370->16359 16371->16359 16372->16370 16373->16370 16376 1a849a7 16374->16376 16375 1a84a84 16375->16375 16376->16375 16382 1a8459c 16376->16382 16379 1a849a7 16378->16379 16380 1a84a84 16379->16380 16381 1a8459c CreateActCtxA 16379->16381 16381->16380 16383 1a85a10 CreateActCtxA 16382->16383 16385 1a85ad3 16383->16385

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 294 1a8d4e8-1a8d587 GetCurrentProcess 298 1a8d589-1a8d58f 294->298 299 1a8d590-1a8d5c4 GetCurrentThread 294->299 298->299 300 1a8d5cd-1a8d601 GetCurrentProcess 299->300 301 1a8d5c6-1a8d5cc 299->301 303 1a8d60a-1a8d625 call 1a8d6c9 300->303 304 1a8d603-1a8d609 300->304 301->300 307 1a8d62b-1a8d65a GetCurrentThreadId 303->307 304->303 308 1a8d65c-1a8d662 307->308 309 1a8d663-1a8d6c5 307->309 308->309
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32 ref: 01A8D576
                                                                                        • GetCurrentThread.KERNEL32 ref: 01A8D5B3
                                                                                        • GetCurrentProcess.KERNEL32 ref: 01A8D5F0
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 01A8D649
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3831579925.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_1a80000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID: Current$ProcessThread
                                                                                        • String ID:
                                                                                        • API String ID: 2063062207-0
                                                                                        • Opcode ID: 34357e84506d86b27e7bb3c348326dc7258696bb5ca36aa34e543f9fb8079243
                                                                                        • Instruction ID: c19ed6cc63bd4473868cd8276f81acfd243ec4a67cc17a89e33314968d3cb345
                                                                                        • Opcode Fuzzy Hash: 34357e84506d86b27e7bb3c348326dc7258696bb5ca36aa34e543f9fb8079243
                                                                                        • Instruction Fuzzy Hash: 595148B0D003498FEB24EFA9D548B9EBBF1EF88314F248069D419A7390DB745945CF65
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 316 1a8d4f8-1a8d587 GetCurrentProcess 320 1a8d589-1a8d58f 316->320 321 1a8d590-1a8d5c4 GetCurrentThread 316->321 320->321 322 1a8d5cd-1a8d601 GetCurrentProcess 321->322 323 1a8d5c6-1a8d5cc 321->323 325 1a8d60a-1a8d625 call 1a8d6c9 322->325 326 1a8d603-1a8d609 322->326 323->322 329 1a8d62b-1a8d65a GetCurrentThreadId 325->329 326->325 330 1a8d65c-1a8d662 329->330 331 1a8d663-1a8d6c5 329->331 330->331
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32 ref: 01A8D576
                                                                                        • GetCurrentThread.KERNEL32 ref: 01A8D5B3
                                                                                        • GetCurrentProcess.KERNEL32 ref: 01A8D5F0
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 01A8D649
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3831579925.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_1a80000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID: Current$ProcessThread
                                                                                        • String ID:
                                                                                        • API String ID: 2063062207-0
                                                                                        • Opcode ID: 231c1c7108bac2308c45d02d22d75d086d92ace73bd7f22b7516a0ef22b7a098
                                                                                        • Instruction ID: 1418b78914f5a161e0fc3a06a284c49a83c4c248173bd82685a90d8a39ba063a
                                                                                        • Opcode Fuzzy Hash: 231c1c7108bac2308c45d02d22d75d086d92ace73bd7f22b7516a0ef22b7a098
                                                                                        • Instruction Fuzzy Hash: 295148B0D003098FEB24EFA9D548B9EBBF1EF88314F248069D419A7390D7746945CF65
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 701 1a85a04-1a85a0c 702 1a85a10-1a85ad1 CreateActCtxA 701->702 704 1a85ada-1a85b34 702->704 705 1a85ad3-1a85ad9 702->705 712 1a85b43-1a85b47 704->712 713 1a85b36-1a85b39 704->713 705->704 714 1a85b58 712->714 715 1a85b49-1a85b55 712->715 713->712 717 1a85b59 714->717 715->714 717->717
                                                                                        APIs
                                                                                        • CreateActCtxA.KERNEL32(?), ref: 01A85AC1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3831579925.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_1a80000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: e215e519a0bd6e93980f89c685cdae303432c7c203ff6609696e44b799ec60af
                                                                                        • Instruction ID: 9a2e9d1e9208d71e8a2a1b620a5c21f163533f164dfe81d00e3c306a3fd77248
                                                                                        • Opcode Fuzzy Hash: e215e519a0bd6e93980f89c685cdae303432c7c203ff6609696e44b799ec60af
                                                                                        • Instruction Fuzzy Hash: EB41CFB1C01719CFEB24DFA9C888B8DBBB5BF49304F20806AD518AB251DB756946CF90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 718 1a8459c-1a85ad1 CreateActCtxA 721 1a85ada-1a85b34 718->721 722 1a85ad3-1a85ad9 718->722 729 1a85b43-1a85b47 721->729 730 1a85b36-1a85b39 721->730 722->721 731 1a85b58 729->731 732 1a85b49-1a85b55 729->732 730->729 734 1a85b59 731->734 732->731 734->734
                                                                                        APIs
                                                                                        • CreateActCtxA.KERNEL32(?), ref: 01A85AC1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3831579925.0000000001A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A80000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_1a80000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: 525e7bb9a4889760b9c5f6522b2c176128b1ad6a121212f997871d9630df7910
                                                                                        • Instruction ID: c2c759777381dc2b606a4467b26151393ba0501c90cf32e932009536dabc807f
                                                                                        • Opcode Fuzzy Hash: 525e7bb9a4889760b9c5f6522b2c176128b1ad6a121212f997871d9630df7910
                                                                                        • Instruction Fuzzy Hash: BB41BFB1C00719CBEB24DFA9C888B9DBBB5BF48304F24816AD518AB251DB756946CF90
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3828206805.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_16ad000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 380e85f27dc8108eac9fc932b197d6e7ec77290245e7ee24e0d68304ebeb9f72
                                                                                        • Instruction ID: 80dec40911c78339f74c1af13b247bb47c890c9608b908b4a26596aa4f408f0a
                                                                                        • Opcode Fuzzy Hash: 380e85f27dc8108eac9fc932b197d6e7ec77290245e7ee24e0d68304ebeb9f72
                                                                                        • Instruction Fuzzy Hash: 70212171604200DFDB05DF44D9C0B5ABB65FB88324F60C169D8090BB46C336E846CAA2
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3828596668.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_16bd000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f427dd2fb2bcfd9ee1854c331efc5723c429b5521013c2b5b44434f7e5ae0c0d
                                                                                        • Instruction ID: dc7263cbd6d25333f8b4fca5e71b7f0e7a4220ab32418e2432fdfb6cc4199dc0
                                                                                        • Opcode Fuzzy Hash: f427dd2fb2bcfd9ee1854c331efc5723c429b5521013c2b5b44434f7e5ae0c0d
                                                                                        • Instruction Fuzzy Hash: A321D075604200DFDB15DF54D9C4B56BB61EB84328F24C5ADD84A4F346C33AD887CB62
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3828596668.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_16bd000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1249dc72a3a97c56e49f7bf9e1147631058bd0ba892be0553f75d46228d3ecae
                                                                                        • Instruction ID: faa20ff623d0d6efe1caa9e153ce5c1c613c6f8c62adc2522302515acb4eb045
                                                                                        • Opcode Fuzzy Hash: 1249dc72a3a97c56e49f7bf9e1147631058bd0ba892be0553f75d46228d3ecae
                                                                                        • Instruction Fuzzy Hash: D4219F755093808FDB03CF24D9D4B15BF71EB46218F28C5DAD8498F6A7C33A984ACB62
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3828206805.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_16ad000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 36a432370afc39991842eb22d0fc5c2cecd1b8a062382e860006dd29b0f294f9
                                                                                        • Instruction ID: 9e44b84dd9a4e218a393e712aa4e18a239c0e4bc57a0dda61e8ae0da925fed0b
                                                                                        • Opcode Fuzzy Hash: 36a432370afc39991842eb22d0fc5c2cecd1b8a062382e860006dd29b0f294f9
                                                                                        • Instruction Fuzzy Hash: F811DF76504240DFDB06CF44D9C4B5ABF61FB84324F24C2A9D8090B657C33AE856CFA1
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3828206805.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_16ad000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 966f1e544444545afc57390194594523bdbfae59879753a5ff293e147193fd91
                                                                                        • Instruction ID: 977da6b5ca3e26f1696561c73959b50e57f03fab4fb9f1df0d6ec4f44054a5ee
                                                                                        • Opcode Fuzzy Hash: 966f1e544444545afc57390194594523bdbfae59879753a5ff293e147193fd91
                                                                                        • Instruction Fuzzy Hash: 17F0F976600A10AF97208F0ADD84C27FBA9EBD4670719C55AEC4A4B712C771EC42CEA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000011.00000002.3828206805.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_17_2_16ad000_E212.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 321c32dca02031923f2a84ec8979c1908c54a78b6cf535d292377df70e8dca4a
                                                                                        • Instruction ID: c81f91d99dc99192260544f18681259135328e1dafca6cdd8a9f52cc9131ac9e
                                                                                        • Opcode Fuzzy Hash: 321c32dca02031923f2a84ec8979c1908c54a78b6cf535d292377df70e8dca4a
                                                                                        • Instruction Fuzzy Hash: 31F03C75104A80AFD3258F06CD84C62BFB9EF856607198489E88A4B712C671FC42CFA0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Execution Graph

                                                                                        Execution Coverage:11.4%
                                                                                        Dynamic/Decrypted Code Coverage:44.2%
                                                                                        Signature Coverage:5%
                                                                                        Total number of Nodes:720
                                                                                        Total number of Limit Nodes:20
                                                                                        execution_graph 23957 6364e0 6 API calls 3 library calls 23958 6358e5 24 API calls CallUnexpected 23995 4041c7 SetUnhandledExceptionFilter 23959 6356eb 52 API calls __RTC_Initialize 23937 405049 TlsAlloc 23975 64396b 15 API calls 2 library calls 23016 401450 23017 40145e 23016->23017 23018 40177f 23017->23018 23019 4017cb VirtualAlloc 23017->23019 23022 4017f8 23019->23022 23020 401fa6 LoadLibraryA 23021 401fe3 23020->23021 23020->23022 23023 402033 GetProcAddress 23021->23023 23026 4020c5 23021->23026 23022->23018 23022->23020 23022->23026 23024 40200e 23023->23024 23025 40207b GetProcAddress 23023->23025 23024->23021 23025->23024 23027 402210 GetPEB 23026->23027 23032 40210a VirtualProtect 23026->23032 23028 4029ad CreateThread 23027->23028 23029 40296e 23027->23029 23030 402b7e WaitForSingleObject 23028->23030 23031 402b5e Sleep 23028->23031 23036 63592c 23028->23036 23033 402983 lstrlenW 23029->23033 23030->23018 23034 402b7b 23031->23034 23033->23028 23034->23030 23039 635b87 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 23036->23039 23038 635931 23038->23038 23039->23038 23976 402d50 GetModuleHandleA GetProcAddress VirtualProtect 23998 638dc7 7 API calls ___scrt_uninitialize_crt 23405 4020e5 23406 4020f4 23405->23406 23407 402210 GetPEB 23406->23407 23416 40210a VirtualProtect 23406->23416 23408 4029ad CreateThread 23407->23408 23409 40296e 23407->23409 23410 402b7e WaitForSingleObject 23408->23410 23411 402b5e Sleep 23408->23411 23417 63592c 4 API calls ___security_init_cookie 23408->23417 23413 402983 lstrlenW 23409->23413 23412 402d3b 23410->23412 23414 402b7b 23411->23414 23413->23408 23414->23410 23978 642949 15 API calls 23941 5e5670 7 API calls __fassign 23942 635e4d 47 API calls _unexpected 23943 648054 25 API calls ___std_exception_copy 23999 407ff0 5 API calls 2 library calls 24000 64dbd7 IsProcessorFeaturePresent 23965 642adf GetCommandLineA GetCommandLineW 23979 40417b 5 API calls ___security_init_cookie 23980 40977c RtlUnwind 23981 642359 16 API calls __dosmaperr 23968 5e149f 40 API calls 23969 406084 SetLastError __ioinit 24002 404185 68 API calls __CxxUnhandledExceptionFilter 23945 641e22 FreeLibrary 23982 63b724 37 API calls _unexpected 24005 405590 6 API calls 3 library calls 23948 614e30 64 API calls ___scrt_uninitialize_crt 23040 6357b0 23041 6357bc ___scrt_is_nonwritable_in_current_image 23040->23041 23066 635a5b 23041->23066 23043 6357c3 23044 635916 23043->23044 23055 6357ed ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 23043->23055 23082 635d35 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter CallUnexpected 23044->23082 23046 63591d 23047 635923 23046->23047 23083 63b466 23 API calls CallUnexpected 23046->23083 23084 63b47c 23 API calls CallUnexpected 23047->23084 23050 63592b 23051 63580c 23052 63588d 23077 635cae GetStartupInfoW CallUnexpected 23052->23077 23054 635893 23078 62f790 23054->23078 23055->23051 23055->23052 23081 63b4b0 37 API calls 3 library calls 23055->23081 23067 635a64 23066->23067 23085 635f48 IsProcessorFeaturePresent 23067->23085 23069 635a70 23086 63644d 10 API calls 2 library calls 23069->23086 23071 635a75 23076 635a79 23071->23076 23087 638e3a 23071->23087 23073 635a90 23073->23043 23076->23043 23077->23054 23157 62f770 23078->23157 23081->23052 23082->23046 23083->23047 23084->23050 23085->23069 23086->23071 23091 64331c 23087->23091 23090 63646c 7 API calls 2 library calls 23090->23076 23092 64332c 23091->23092 23093 635a82 23091->23093 23092->23093 23096 6428e9 23092->23096 23108 642a2b 23092->23108 23093->23073 23093->23090 23097 6428f5 ___scrt_is_nonwritable_in_current_image 23096->23097 23113 642310 EnterCriticalSection 23097->23113 23099 6428fc 23114 645431 23099->23114 23104 642915 23106 642a2b 2 API calls 23104->23106 23105 64292b 23105->23092 23107 64291a 23106->23107 23128 642940 LeaveCriticalSection CallUnexpected 23107->23128 23110 642a32 23108->23110 23109 642a75 GetStdHandle 23109->23110 23110->23109 23111 642adb 23110->23111 23112 642a88 GetFileType 23110->23112 23111->23092 23112->23110 23113->23099 23115 64543d ___scrt_is_nonwritable_in_current_image 23114->23115 23116 645446 23115->23116 23117 645467 23115->23117 23137 63c299 14 API calls __dosmaperr 23116->23137 23129 642310 EnterCriticalSection 23117->23129 23120 64544b 23138 6433b5 25 API calls ___std_exception_copy 23120->23138 23122 64290b 23122->23107 23127 642975 28 API calls 23122->23127 23123 64549f 23139 6454c6 LeaveCriticalSection CallUnexpected 23123->23139 23124 645473 23124->23123 23130 645381 23124->23130 23127->23104 23128->23105 23129->23124 23140 645515 23130->23140 23132 645393 23136 6453a0 23132->23136 23147 641fd3 6 API calls _unexpected 23132->23147 23135 6453f5 23135->23124 23148 6432e2 23136->23148 23137->23120 23138->23122 23139->23122 23141 645522 _unexpected 23140->23141 23142 645562 23141->23142 23143 64554d RtlAllocateHeap 23141->23143 23154 6435a5 EnterCriticalSection LeaveCriticalSection _unexpected 23141->23154 23155 63c299 14 API calls __dosmaperr 23142->23155 23143->23141 23145 645560 23143->23145 23145->23132 23147->23132 23149 6432ed RtlFreeHeap 23148->23149 23153 643316 _free 23148->23153 23150 643302 23149->23150 23149->23153 23156 63c299 14 API calls __dosmaperr 23150->23156 23152 643308 GetLastError 23152->23153 23153->23135 23154->23141 23155->23145 23156->23152 23166 5e66d0 23157->23166 23165 62f784 ExitProcess 23167 5e66e2 ___scrt_uninitialize_crt 23166->23167 23168 5e672c ExitProcess 23167->23168 23169 5e673b 23167->23169 23170 5e6759 GetModuleFileNameW CreateFileW 23169->23170 23182 5e6744 23169->23182 23171 5e67d1 23170->23171 23170->23182 23172 5e6826 CloseHandle 23171->23172 23173 5e6824 23171->23173 23172->23182 23239 63d764 23173->23239 23176 5e68ce 23177 5e68f8 23176->23177 23178 5e68d3 23176->23178 23246 63d6c5 23177->23246 23249 5e6930 LoadLibraryA GetProcAddress ExitProcess __fassign 23178->23249 23181 5e68da 23183 63d6c5 ___std_exception_copy 14 API calls 23181->23183 23185 616ce0 23182->23185 23184 5e68e6 23183->23184 23184->23182 23188 616cf3 23185->23188 23186 616cfd 23190 5e1300 23186->23190 23188->23186 23252 62c840 23188->23252 23255 616830 23188->23255 23191 5e1309 GetUserNameW 23190->23191 23192 5e1343 23191->23192 23193 5e1341 23191->23193 23192->23193 23194 5e135b GetComputerNameW 23192->23194 23199 62d650 23193->23199 23196 5e1382 23194->23196 23197 5e1380 23194->23197 23196->23197 23323 5e1000 ExitProcess 23196->23323 23197->23193 23200 62d65e 23199->23200 23324 6348e0 23200->23324 23204 62e24a 23204->23165 23205 62e38e 23365 62d600 125 API calls 23205->23365 23207 62f5ce 23366 616f30 68 API calls ___std_exception_copy 23207->23366 23209 62f5e4 23367 631e80 66 API calls 5 library calls 23209->23367 23211 62f5ef 23368 6315f0 61 API calls 4 library calls 23211->23368 23213 62f62e 23370 617050 81 API calls 2 library calls 23213->23370 23215 62f5f7 23215->23213 23369 630590 79 API calls 23215->23369 23217 62f67a 23217->23204 23218 62f6ed 23217->23218 23371 630700 48 API calls __fassign 23218->23371 23220 63d764 15 API calls ___std_exception_copy 23235 62e229 CallUnexpected _strlen 23220->23235 23221 63d78f 39 API calls _mbstowcs 23221->23235 23222 616f30 68 API calls 23222->23235 23225 617050 81 API calls 23225->23235 23226 63d6c5 14 API calls ___std_exception_copy 23226->23235 23229 63da4e 37 API calls 23229->23235 23230 62f379 LoadLibraryW 23230->23235 23231 6165e0 28 API calls 23237 62f1a1 __fassign CallUnexpected 23231->23237 23232 62f250 CreateProcessW CloseHandle 23232->23235 23233 63d78f 39 API calls _mbstowcs 23233->23237 23235->23204 23235->23205 23235->23220 23235->23221 23235->23222 23235->23225 23235->23226 23235->23229 23235->23237 23359 5f3120 78 API calls 2 library calls 23235->23359 23360 5e32a0 114 API calls 4 library calls 23235->23360 23361 62fb30 82 API calls 2 library calls 23235->23361 23362 62f710 GetSystemTimeAsFileTime 23235->23362 23363 63da3c 37 API calls _unexpected 23235->23363 23237->23230 23237->23231 23237->23232 23237->23233 23237->23235 23238 62f4f4 CreateProcessW CloseHandle 23237->23238 23364 62f720 42 API calls 23237->23364 23238->23235 23244 643a7f _unexpected 23239->23244 23240 643abd 23251 63c299 14 API calls __dosmaperr 23240->23251 23242 643aa8 RtlAllocateHeap 23243 5e6857 ReadFile FindCloseChangeNotification 23242->23243 23242->23244 23243->23176 23244->23240 23244->23242 23250 6435a5 EnterCriticalSection LeaveCriticalSection _unexpected 23244->23250 23247 6432e2 _free 14 API calls 23246->23247 23248 63d6dd 23247->23248 23248->23182 23249->23181 23250->23244 23251->23243 23279 62c700 23252->23279 23256 61683e CallUnexpected _strlen 23255->23256 23290 63d76f 23256->23290 23259 616969 23261 6169b6 23259->23261 23262 6169b8 WinHttpOpenRequest 23259->23262 23260 61696b WinHttpConnect 23260->23259 23263 616a21 WinHttpSendRequest 23261->23263 23264 616a1f 23261->23264 23262->23261 23263->23264 23265 616a71 WinHttpReceiveResponse 23264->23265 23268 616a8e 23264->23268 23265->23268 23266 616aa3 WinHttpQueryDataAvailable 23266->23268 23267 616b80 23267->23188 23268->23266 23269 616b12 WinHttpReadData 23268->23269 23270 616aca 23268->23270 23269->23268 23270->23267 23271 616bf9 23270->23271 23273 616bf7 23270->23273 23293 6166e0 15 API calls 3 library calls 23271->23293 23274 616c78 23273->23274 23275 616c6a WinHttpCloseHandle 23273->23275 23276 616c87 23274->23276 23277 616c8b WinHttpCloseHandle 23274->23277 23275->23274 23276->23267 23278 616ca6 WinHttpCloseHandle 23276->23278 23277->23276 23278->23267 23288 63dc70 23279->23288 23282 62c764 23282->23188 23283 62c77b 23284 63d764 ___std_exception_copy 15 API calls 23283->23284 23285 62c794 CryptStringToBinaryA 23284->23285 23285->23282 23286 62c7eb 23285->23286 23287 63d6c5 ___std_exception_copy 14 API calls 23286->23287 23287->23282 23289 62c719 CryptStringToBinaryA 23288->23289 23289->23282 23289->23283 23294 63d7b9 23290->23294 23293->23267 23295 63d7d0 23294->23295 23296 63d7d4 23295->23296 23297 63d80f 23295->23297 23315 638f7e 37 API calls 2 library calls 23296->23315 23317 63c299 14 API calls __dosmaperr 23297->23317 23299 63d814 23318 6433b5 25 API calls ___std_exception_copy 23299->23318 23302 6168e0 WinHttpOpen 23302->23259 23302->23260 23303 63d7f1 23304 63d802 23303->23304 23305 63d820 23303->23305 23316 63c299 14 API calls __dosmaperr 23304->23316 23319 63d899 39 API calls 4 library calls 23305->23319 23308 63d82e 23309 63d836 23308->23309 23312 63d848 23308->23312 23320 63c299 14 API calls __dosmaperr 23309->23320 23312->23302 23321 63c299 14 API calls __dosmaperr 23312->23321 23314 63d807 23322 6433b5 25 API calls ___std_exception_copy 23314->23322 23315->23303 23316->23314 23317->23299 23318->23302 23319->23308 23320->23302 23321->23314 23322->23302 23323->23197 23325 634907 CallUnexpected _strlen 23324->23325 23326 63d76f 39 API calls 23325->23326 23327 634940 WinHttpOpen 23326->23327 23328 6349b7 WinHttpConnect 23327->23328 23329 6349e9 23327->23329 23328->23329 23331 6349f0 WinHttpOpenRequest 23329->23331 23332 634a3a CallUnexpected 23329->23332 23331->23332 23372 631510 23332->23372 23334 634a9a __CreateFrameInfo 23336 634ab7 wsprintfW WinHttpAddRequestHeaders 23334->23336 23338 634b0f _strlen 23334->23338 23335 634b7b 23339 634b84 WinHttpReceiveResponse 23335->23339 23345 634ba4 23335->23345 23337 63d6c5 ___std_exception_copy 14 API calls 23336->23337 23337->23338 23338->23335 23342 634b38 WinHttpSendRequest 23338->23342 23339->23345 23340 634bc5 WinHttpQueryDataAvailable 23340->23345 23341 634cdb 23344 634cf6 23341->23344 23346 634ce4 WinHttpCloseHandle 23341->23346 23342->23335 23343 634cc9 WinHttpCloseHandle 23343->23341 23347 634d11 23344->23347 23349 634cff WinHttpCloseHandle 23344->23349 23345->23340 23348 634c30 WinHttpReadData 23345->23348 23352 634bb8 23345->23352 23346->23344 23350 62c840 17 API calls 23347->23350 23348->23345 23349->23347 23351 634d1d 23350->23351 23353 63d6c5 ___std_exception_copy 14 API calls 23351->23353 23352->23341 23352->23343 23354 62e21a 23352->23354 23353->23354 23355 5e13c0 23354->23355 23356 5e13c9 23355->23356 23357 5e13dd 23356->23357 23404 5e1430 40 API calls 23356->23404 23357->23235 23359->23235 23360->23235 23361->23235 23362->23235 23363->23235 23364->23237 23365->23207 23366->23209 23367->23211 23368->23215 23369->23213 23370->23217 23375 631540 23372->23375 23376 63154b 23375->23376 23379 639035 23376->23379 23382 639383 23379->23382 23381 631530 23381->23334 23383 6393a3 23382->23383 23384 63938e 23382->23384 23386 6393e5 23383->23386 23389 6393b1 23383->23389 23398 63c299 14 API calls __dosmaperr 23384->23398 23402 63c299 14 API calls __dosmaperr 23386->23402 23388 639393 23399 6433b5 25 API calls ___std_exception_copy 23388->23399 23400 63a29c 44 API calls 4 library calls 23389->23400 23390 6393dd 23403 6433b5 25 API calls ___std_exception_copy 23390->23403 23393 63939e 23393->23381 23394 6393c9 23396 6393f5 23394->23396 23401 63c299 14 API calls __dosmaperr 23394->23401 23396->23381 23398->23388 23399->23393 23400->23394 23401->23390 23402->23390 23403->23396 23404->23357 23949 643a33 71 API calls 2 library calls 23970 6494bd 52 API calls 2 library calls 23986 64233e GetProcessHeap 23972 64d6bf 20 API calls 23932 402d9e 23933 402da7 23932->23933 23934 402db1 23933->23934 23935 402ed8 GetModuleHandleA GetProcAddress VirtualProtect 23933->23935 23936 402fb2 23935->23936 23987 5f6900 15 API calls ___std_exception_copy 23453 404029 23454 404035 __ioinit 23453->23454 23488 4054f9 HeapCreate 23454->23488 23457 404092 23490 40536c GetModuleHandleW 23457->23490 23461 4040a3 __RTC_Initialize 23524 404cbc 23461->23524 23464 4040b2 23465 4040be GetCommandLineA 23464->23465 23600 404205 66 API calls 3 library calls 23464->23600 23539 404b85 23465->23539 23468 4040bd 23468->23465 23472 4040e3 23576 404852 23472->23576 23478 4040fc 23480 404107 23478->23480 23603 404205 66 API calls 3 library calls 23478->23603 23479 4040f4 23591 4042c4 23479->23591 23597 403520 FreeConsole 23480->23597 23483 404124 23484 404136 23483->23484 23604 404475 66 API calls _doexit 23483->23604 23605 4044a1 66 API calls _doexit 23484->23605 23487 40413b __ioinit 23489 404086 23488->23489 23489->23457 23598 404000 66 API calls 3 library calls 23489->23598 23491 405380 23490->23491 23492 405387 23490->23492 23606 4041d5 Sleep GetModuleHandleW 23491->23606 23494 405391 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 23492->23494 23495 4054ef 23492->23495 23496 4053da TlsAlloc 23494->23496 23628 405086 69 API calls 2 library calls 23495->23628 23500 404098 23496->23500 23501 405428 TlsSetValue 23496->23501 23498 405386 23498->23492 23500->23461 23599 404000 66 API calls 3 library calls 23500->23599 23501->23500 23502 405439 23501->23502 23607 4044bf 6 API calls 3 library calls 23502->23607 23504 40543e 23608 404f5c TlsGetValue 23504->23608 23507 404f5c __encode_pointer 6 API calls 23508 405459 23507->23508 23509 404f5c __encode_pointer 6 API calls 23508->23509 23510 405469 23509->23510 23511 404f5c __encode_pointer 6 API calls 23510->23511 23512 405479 23511->23512 23618 4057fc InitializeCriticalSectionAndSpinCount __ioinit 23512->23618 23514 405486 23514->23495 23619 404fd7 6 API calls __crt_waiting_on_module_handle 23514->23619 23516 40549a 23516->23495 23620 406591 23516->23620 23520 4054cd 23520->23495 23521 4054d4 23520->23521 23627 4050c3 66 API calls 5 library calls 23521->23627 23523 4054dc GetCurrentThreadId 23523->23500 23649 40552c 23524->23649 23526 404cc8 GetStartupInfoA 23527 406591 __calloc_crt 66 API calls 23526->23527 23535 404ce9 23527->23535 23528 404f07 __ioinit 23528->23464 23529 404e84 GetStdHandle 23534 404e4e 23529->23534 23530 406591 __calloc_crt 66 API calls 23530->23535 23531 404ee9 SetHandleCount 23531->23528 23532 404e96 GetFileType 23532->23534 23533 404dd1 23533->23528 23533->23534 23536 404dfa GetFileType 23533->23536 23650 40604c InitializeCriticalSectionAndSpinCount __ioinit 23533->23650 23534->23528 23534->23529 23534->23531 23534->23532 23651 40604c InitializeCriticalSectionAndSpinCount __ioinit 23534->23651 23535->23528 23535->23530 23535->23533 23535->23534 23536->23533 23540 404bc2 23539->23540 23541 404ba3 GetEnvironmentStringsW 23539->23541 23543 404bab 23540->23543 23544 404c5b 23540->23544 23542 404bb7 GetLastError 23541->23542 23541->23543 23542->23540 23545 404bed WideCharToMultiByte 23543->23545 23546 404bde GetEnvironmentStringsW 23543->23546 23547 404c64 GetEnvironmentStrings 23544->23547 23548 4040ce 23544->23548 23551 404c50 FreeEnvironmentStringsW 23545->23551 23552 404c21 23545->23552 23546->23545 23546->23548 23547->23548 23549 404c74 23547->23549 23565 404aca 23548->23565 23553 40654c __malloc_crt 66 API calls 23549->23553 23551->23548 23652 40654c 23552->23652 23555 404c8e 23553->23555 23557 404ca1 23555->23557 23558 404c95 FreeEnvironmentStringsA 23555->23558 23659 406e00 __VEC_memcpy 23557->23659 23558->23548 23559 404c2f WideCharToMultiByte 23561 404c41 23559->23561 23562 404c49 23559->23562 23658 4064be 66 API calls 7 library calls 23561->23658 23562->23551 23563 404cab FreeEnvironmentStringsA 23563->23548 23566 404ae4 GetModuleFileNameA 23565->23566 23567 404adf 23565->23567 23569 404b0b 23566->23569 23693 406d77 23567->23693 23687 404930 23569->23687 23572 40654c __malloc_crt 66 API calls 23573 404b4d 23572->23573 23574 404930 _parse_cmdline 76 API calls 23573->23574 23575 4040d8 23573->23575 23574->23575 23575->23472 23601 404205 66 API calls 3 library calls 23575->23601 23577 40485b 23576->23577 23579 404860 _strlen 23576->23579 23578 406d77 ___initmbctable 110 API calls 23577->23578 23578->23579 23580 406591 __calloc_crt 66 API calls 23579->23580 23583 4040e9 23579->23583 23586 404895 _strlen 23580->23586 23581 4048f3 23925 4064be 66 API calls 7 library calls 23581->23925 23583->23479 23602 404205 66 API calls 3 library calls 23583->23602 23584 406591 __calloc_crt 66 API calls 23584->23586 23585 404919 23926 4064be 66 API calls 7 library calls 23585->23926 23586->23581 23586->23583 23586->23584 23586->23585 23589 4048da 23586->23589 23923 40640b 66 API calls 2 library calls 23586->23923 23589->23586 23924 4059ba 10 API calls 3 library calls 23589->23924 23593 4042d2 __IsNonwritableInCurrentImage 23591->23593 23927 405c9b 23593->23927 23594 4042f0 __initterm_e 23596 40430f __IsNonwritableInCurrentImage __initterm 23594->23596 23931 405c84 74 API calls __cinit 23594->23931 23596->23478 23597->23483 23598->23457 23599->23461 23600->23468 23601->23472 23602->23479 23603->23480 23604->23484 23605->23487 23606->23498 23607->23504 23609 404f74 23608->23609 23610 404f95 GetModuleHandleW 23608->23610 23609->23610 23611 404f7e TlsGetValue 23609->23611 23612 404fb0 GetProcAddress 23610->23612 23613 404fa5 23610->23613 23615 404f89 23611->23615 23617 404f8d 23612->23617 23629 4041d5 Sleep GetModuleHandleW 23613->23629 23615->23610 23615->23617 23616 404fab 23616->23612 23616->23617 23617->23507 23618->23514 23619->23516 23622 40659a 23620->23622 23623 4054b3 23622->23623 23624 4065b8 Sleep 23622->23624 23630 40843f 23622->23630 23623->23495 23626 404fd7 6 API calls __crt_waiting_on_module_handle 23623->23626 23625 4065cd 23624->23625 23625->23622 23625->23623 23626->23520 23627->23523 23628->23500 23629->23616 23631 40844b __ioinit 23630->23631 23632 408463 23631->23632 23642 408482 _memset 23631->23642 23643 405b4a 66 API calls __getptd_noexit 23632->23643 23634 408468 23644 405ae2 6 API calls 2 library calls 23634->23644 23636 4084f4 RtlAllocateHeap 23636->23642 23639 408478 __ioinit 23639->23622 23642->23636 23642->23639 23645 405978 66 API calls 2 library calls 23642->23645 23646 407c69 5 API calls 2 library calls 23642->23646 23647 40853b LeaveCriticalSection _doexit 23642->23647 23648 4060bb 6 API calls __decode_pointer 23642->23648 23643->23634 23645->23642 23646->23642 23647->23642 23648->23642 23649->23526 23650->23533 23651->23534 23654 406555 23652->23654 23655 404c27 23654->23655 23656 40656c Sleep 23654->23656 23660 408375 23654->23660 23655->23551 23655->23559 23657 406581 23656->23657 23657->23654 23657->23655 23658->23562 23659->23563 23661 408428 23660->23661 23670 408387 23660->23670 23685 4060bb 6 API calls __decode_pointer 23661->23685 23663 40842e 23686 405b4a 66 API calls __getptd_noexit 23663->23686 23668 4083e4 RtlAllocateHeap 23668->23670 23670->23668 23671 408398 23670->23671 23672 408414 23670->23672 23675 408419 23670->23675 23677 408420 23670->23677 23681 408326 66 API calls 4 library calls 23670->23681 23682 4060bb 6 API calls __decode_pointer 23670->23682 23671->23670 23678 4046b8 66 API calls 2 library calls 23671->23678 23679 40450d 66 API calls 7 library calls 23671->23679 23680 404259 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 23671->23680 23683 405b4a 66 API calls __getptd_noexit 23672->23683 23684 405b4a 66 API calls __getptd_noexit 23675->23684 23677->23654 23678->23671 23679->23671 23681->23670 23682->23670 23683->23675 23684->23677 23685->23663 23686->23677 23688 40494f 23687->23688 23691 4049bc 23688->23691 23697 406de8 76 API calls x_ismbbtype_l 23688->23697 23690 404aba 23690->23572 23690->23575 23691->23690 23692 406de8 76 API calls _parse_cmdline 23691->23692 23692->23691 23694 406d80 23693->23694 23695 406d87 23693->23695 23698 406bdd 23694->23698 23695->23566 23697->23688 23699 406be9 __ioinit 23698->23699 23729 405223 23699->23729 23703 406bfc 23750 40697c 23703->23750 23706 40654c __malloc_crt 66 API calls 23707 406c1d 23706->23707 23708 406d3c __ioinit 23707->23708 23757 4069f8 23707->23757 23708->23695 23711 406d49 23711->23708 23715 406d5c 23711->23715 23771 4064be 66 API calls 7 library calls 23711->23771 23712 406c4d InterlockedDecrement 23713 406c5d 23712->23713 23714 406c6e InterlockedIncrement 23712->23714 23713->23714 23767 4064be 66 API calls 7 library calls 23713->23767 23714->23708 23716 406c84 23714->23716 23772 405b4a 66 API calls __getptd_noexit 23715->23772 23716->23708 23768 405978 66 API calls 2 library calls 23716->23768 23720 406c6d 23720->23714 23723 406c98 InterlockedDecrement 23724 406d14 23723->23724 23725 406d27 InterlockedIncrement 23723->23725 23724->23725 23769 4064be 66 API calls 7 library calls 23724->23769 23770 406d3e LeaveCriticalSection _doexit 23725->23770 23728 406d26 23728->23725 23773 4051aa GetLastError 23729->23773 23731 40522b 23733 405238 23731->23733 23788 404205 66 API calls 3 library calls 23731->23788 23734 406851 23733->23734 23735 40685d __ioinit 23734->23735 23736 405223 __getptd 66 API calls 23735->23736 23737 406862 23736->23737 23747 406874 23737->23747 23799 405978 66 API calls 2 library calls 23737->23799 23739 406892 23740 4068db 23739->23740 23741 4068c3 InterlockedIncrement 23739->23741 23742 4068a9 InterlockedDecrement 23739->23742 23801 4068ec LeaveCriticalSection _doexit 23740->23801 23741->23740 23742->23741 23746 4068b4 23742->23746 23745 406882 __ioinit 23745->23703 23746->23741 23800 4064be 66 API calls 7 library calls 23746->23800 23747->23745 23798 404205 66 API calls 3 library calls 23747->23798 23749 4068c2 23749->23741 23802 4068f5 23750->23802 23753 4069b9 23755 4069be GetACP 23753->23755 23756 4069ab 23753->23756 23754 40699b GetOEMCP 23754->23756 23755->23756 23756->23706 23756->23708 23758 40697c getSystemCP 78 API calls 23757->23758 23759 406a18 23758->23759 23760 406a23 setSBCS 23759->23760 23762 406a67 IsValidCodePage 23759->23762 23766 406a8c _memset __setmbcp_nolock 23759->23766 23821 407f4e 23760->23821 23762->23760 23764 406a79 GetCPInfo 23762->23764 23763 406bdb 23763->23711 23763->23712 23764->23760 23764->23766 23811 4066be GetCPInfo 23766->23811 23767->23720 23768->23723 23769->23728 23770->23708 23771->23715 23772->23708 23789 405052 TlsGetValue 23773->23789 23775 405217 SetLastError 23775->23731 23777 406591 __calloc_crt 63 API calls 23778 4051d5 23777->23778 23778->23775 23779 4051dd 23778->23779 23794 404fd7 6 API calls __crt_waiting_on_module_handle 23779->23794 23781 4051ef 23782 4051f6 23781->23782 23783 40520e 23781->23783 23795 4050c3 66 API calls 5 library calls 23782->23795 23796 4064be 66 API calls 7 library calls 23783->23796 23786 405214 23786->23775 23787 4051fe GetCurrentThreadId 23787->23775 23788->23733 23790 405082 23789->23790 23791 405067 23789->23791 23790->23775 23790->23777 23797 404fd7 6 API calls __crt_waiting_on_module_handle 23791->23797 23793 405072 TlsSetValue 23793->23790 23794->23781 23795->23787 23796->23786 23797->23793 23798->23745 23799->23739 23800->23749 23801->23747 23803 406908 23802->23803 23809 406955 23802->23809 23804 405223 __getptd 66 API calls 23803->23804 23805 40690d 23804->23805 23806 406935 23805->23806 23810 407414 74 API calls 5 library calls 23805->23810 23808 406851 __setmbcp 68 API calls 23806->23808 23806->23809 23808->23809 23809->23753 23809->23754 23810->23806 23812 4067a4 23811->23812 23814 4066f2 _memset 23811->23814 23817 407f4e setSBUpLow 5 API calls 23812->23817 23829 408d1c 23814->23829 23819 40684f 23817->23819 23819->23766 23820 408b1d ___crtLCMapStringA 101 API calls 23820->23812 23822 407f56 23821->23822 23823 407f58 IsDebuggerPresent 23821->23823 23822->23763 23922 4081ca 23823->23922 23826 409742 SetUnhandledExceptionFilter UnhandledExceptionFilter 23827 409767 GetCurrentProcess TerminateProcess 23826->23827 23828 40975f __invoke_watson 23826->23828 23827->23763 23828->23827 23830 4068f5 _LocaleUpdate::_LocaleUpdate 76 API calls 23829->23830 23831 408d2f 23830->23831 23839 408b62 23831->23839 23834 408b1d 23835 4068f5 _LocaleUpdate::_LocaleUpdate 76 API calls 23834->23835 23836 408b30 23835->23836 23867 408778 23836->23867 23840 408b83 GetStringTypeW 23839->23840 23841 408bae 23839->23841 23843 408ba3 GetLastError 23840->23843 23844 408b9b 23840->23844 23842 408c95 23841->23842 23841->23844 23864 409a8c 90 API calls 2 library calls 23842->23864 23843->23841 23845 408be7 MultiByteToWideChar 23844->23845 23862 408c8f 23844->23862 23851 408c14 23845->23851 23845->23862 23847 407f4e setSBUpLow 5 API calls 23849 40675f 23847->23849 23848 408cb9 23850 408ce6 GetStringTypeA 23848->23850 23848->23862 23865 409ad5 73 API calls 8 library calls 23848->23865 23849->23834 23855 408d01 23850->23855 23850->23862 23852 408375 _malloc 66 API calls 23851->23852 23856 408c29 _memset __alloca_probe_16 23851->23856 23852->23856 23854 408c62 MultiByteToWideChar 23858 408c78 GetStringTypeW 23854->23858 23859 408c89 23854->23859 23866 4064be 66 API calls 7 library calls 23855->23866 23856->23854 23856->23862 23857 408cda 23857->23850 23857->23862 23858->23859 23863 408306 66 API calls __crtGetStringTypeA_stat 23859->23863 23862->23847 23863->23862 23864->23848 23865->23857 23866->23862 23868 408799 LCMapStringW 23867->23868 23872 4087b4 23867->23872 23869 4087bc GetLastError 23868->23869 23868->23872 23869->23872 23870 4089b2 23916 409a8c 90 API calls 2 library calls 23870->23916 23871 40880e 23873 4089a9 23871->23873 23874 408827 MultiByteToWideChar 23871->23874 23872->23870 23872->23871 23876 407f4e setSBUpLow 5 API calls 23873->23876 23874->23873 23882 408854 23874->23882 23878 40677f 23876->23878 23877 4089da 23877->23873 23879 4089f3 23877->23879 23880 408ace LCMapStringA 23877->23880 23878->23820 23917 409ad5 73 API calls 8 library calls 23879->23917 23913 408a2a 23880->23913 23881 4088a5 MultiByteToWideChar 23885 4088be LCMapStringW 23881->23885 23907 4089a0 23881->23907 23887 408375 _malloc 66 API calls 23882->23887 23892 40886d __alloca_probe_16 23882->23892 23884 408a05 23884->23873 23888 408a0f LCMapStringA 23884->23888 23890 4088df 23885->23890 23885->23907 23886 408af5 23886->23873 23921 4064be 66 API calls 7 library calls 23886->23921 23887->23892 23895 408a31 23888->23895 23888->23913 23893 4088e8 23890->23893 23897 408911 23890->23897 23892->23873 23892->23881 23896 4088fa LCMapStringW 23893->23896 23893->23907 23898 408a42 _memset __alloca_probe_16 23895->23898 23902 408375 _malloc 66 API calls 23895->23902 23896->23907 23900 40892c __alloca_probe_16 23897->23900 23901 408375 _malloc 66 API calls 23897->23901 23906 408a80 LCMapStringA 23898->23906 23898->23913 23899 408960 LCMapStringW 23903 408978 WideCharToMultiByte 23899->23903 23904 40899a 23899->23904 23900->23899 23900->23907 23901->23900 23902->23898 23903->23904 23914 408306 66 API calls __crtGetStringTypeA_stat 23904->23914 23908 408aa0 23906->23908 23909 408a9c 23906->23909 23915 408306 66 API calls __crtGetStringTypeA_stat 23907->23915 23918 409ad5 73 API calls 8 library calls 23908->23918 23919 408306 66 API calls __crtGetStringTypeA_stat 23909->23919 23913->23886 23920 4064be 66 API calls 7 library calls 23913->23920 23914->23907 23915->23873 23916->23877 23917->23884 23918->23909 23919->23913 23920->23886 23921->23873 23922->23826 23923->23586 23924->23589 23925->23583 23926->23583 23928 405ca1 23927->23928 23929 404f5c __encode_pointer 6 API calls 23928->23929 23930 405cb9 23928->23930 23929->23928 23930->23594 23931->23596 23973 636490 5 API calls __ehhandler$___std_fs_change_permissions@12 24011 642b90 47 API calls 23418 63c39b 23419 63c50b 23418->23419 23420 63c52a 23419->23420 23424 63c3d7 23419->23424 23422 63c521 23422->23420 23435 63c644 45 API calls 3 library calls 23422->23435 23425 63c3e3 23424->23425 23426 63c3e0 23424->23426 23436 647691 GetEnvironmentStringsW 23425->23436 23426->23422 23429 63c3f0 23431 6432e2 _free 14 API calls 23429->23431 23433 63c41f 23431->23433 23432 63c3fb 23434 6432e2 _free 14 API calls 23432->23434 23433->23422 23434->23429 23435->23420 23437 6476a5 23436->23437 23438 63c3ea 23436->23438 23444 643a7f 23437->23444 23438->23429 23443 63c537 25 API calls 3 library calls 23438->23443 23440 6432e2 _free 14 API calls 23442 6476d3 FreeEnvironmentStringsW 23440->23442 23441 6476b9 __fassign 23441->23440 23442->23438 23443->23432 23445 643abd 23444->23445 23449 643a8d _unexpected 23444->23449 23452 63c299 14 API calls __dosmaperr 23445->23452 23447 643aa8 RtlAllocateHeap 23448 643abb 23447->23448 23447->23449 23448->23441 23449->23445 23449->23447 23451 6435a5 EnterCriticalSection LeaveCriticalSection _unexpected 23449->23451 23451->23449 23452->23448 23989 64c91c 26 API calls std::exception::exception 23974 64229e 7 API calls 23990 642f1f LeaveCriticalSection CallUnexpected 23954 40523d 75 API calls 6 library calls 23955 64ca19 53 API calls 3 library calls 23991 40413d 66 API calls __XcptFilter 24012 63579e 26 API calls 23992 5f6920 14 API calls ___std_exception_copy

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 136 401450-40145c 137 401463-40177d call 401000 136->137 138 40145e 136->138 144 401789-4017ae 137->144 145 40177f-401784 137->145 138->137 139 401460 138->139 139->137 147 4017b0-4017ba 144->147 148 4017bc-4017c5 144->148 146 402d3b-402d41 145->146 149 4017cb-4017f6 VirtualAlloc 147->149 148->149 150 401813-401a3e call 401430 149->150 151 4017f8-401807 149->151 155 401a40 150->155 156 401a45-401b97 150->156 151->150 152 401809-40180e 151->152 152->146 155->156 157 401a42 155->157 159 401ba8-401bb8 156->159 157->156 160 401c09-401ca0 159->160 161 401bba-401c07 call 401430 159->161 163 401dc6-401f7b 160->163 164 401ca6-401ccd 160->164 161->159 166 401f8c-401fa0 163->166 165 401cd7-401ce3 164->165 165->163 168 401ce9-401d2a 165->168 169 401fa6-401fdf LoadLibraryA 166->169 170 4020ca 166->170 172 401d3b-401d47 168->172 175 401fe1 169->175 176 401fe3-40200c 169->176 173 4020d1-402104 170->173 174 4020cc 170->174 177 401da0-401dc1 172->177 178 401d49-401d58 172->178 192 402210-40296c GetPEB 173->192 193 40210a-402139 173->193 174->173 179 4020ce 174->179 175->166 181 40201d-40202d 176->181 177->165 184 401d5a-401d8c 178->184 185 401d8f-401d9e 178->185 179->173 182 402033-402079 GetProcAddress 181->182 183 4020c5 181->183 187 402098-4020c0 182->187 188 40207b-402092 GetProcAddress 182->188 183->170 184->185 185->172 187->181 188->187 196 4029ad-402b5c CreateThread 192->196 197 40296e-4029aa call 401430 lstrlenW 192->197 194 402162-40216e 193->194 195 40213b-402147 193->195 198 402170-40217c 194->198 199 40218a-402195 194->199 195->194 200 402149-402154 195->200 202 402b7e-402d39 WaitForSingleObject 196->202 203 402b5e-402b7b Sleep call 401430 196->203 197->196 198->199 204 40217e-402188 198->204 205 4021b1-4021bd 199->205 206 402197-4021a3 199->206 200->194 207 402156-402160 200->207 202->146 203->202 211 4021c9-40220b VirtualProtect 204->211 205->211 213 4021bf 205->213 206->205 212 4021a5-4021af 206->212 207->211 212->211 213->211
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(?,?,00003000,00000004), ref: 004017E3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID: $MZx
                                                                                        • API String ID: 4275171209-1316729395
                                                                                        • Opcode ID: 2588e99f776bf45b4239edc2faf0be46d4a3fba49149700422781b86762e8510
                                                                                        • Instruction ID: 41943d6f200ca8c9ccc6406f3e96663368b91ad62feb103387bd3ee0cf9046f5
                                                                                        • Opcode Fuzzy Hash: 2588e99f776bf45b4239edc2faf0be46d4a3fba49149700422781b86762e8510
                                                                                        • Instruction Fuzzy Hash: 36D28D37D117294BE7148A3CCC857A8A522EBD9320F51E772D82DEF6E4C7388D858B85
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 314 5e1300-5e133f GetUserNameW 316 5e1343-5e1359 call 5e1290 314->316 317 5e1341 314->317 318 5e13ac-5e13b7 316->318 322 5e135b-5e137e GetComputerNameW 316->322 317->318 324 5e1382-5e1398 call 5e1290 322->324 325 5e1380 322->325 328 5e13aa 324->328 329 5e139a-5e13a7 call 5e1000 324->329 325->318 328->318 329->328
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Name$ComputerUser
                                                                                        • String ID:
                                                                                        • API String ID: 4229901323-0
                                                                                        • Opcode ID: 91ee45947d1ea17558ad4a23b116d39be8ea5b55042e224f7e9d98470869c2b5
                                                                                        • Instruction ID: 958cc277367aee24dc3cd944610754de8b4588de054623047b8d0bdd6e34c983
                                                                                        • Opcode Fuzzy Hash: 91ee45947d1ea17558ad4a23b116d39be8ea5b55042e224f7e9d98470869c2b5
                                                                                        • Instruction Fuzzy Hash: 8F1167F5C04B82DBDB246F2AE94906ABFA8FB49351F500C39E4C686A01E7318554CB97
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        • NmLpQW--spam2, xrefs: 00634A72
                                                                                        • 7d98652ded8515eb4124c533a671c7aa, xrefs: 00634A78
                                                                                        • POST, xrefs: 006349F4
                                                                                        • act=recive_message&lid=%s&j=%s&ver=4.0, xrefs: 00634A6C
                                                                                        • Content-Type: application/x-www-form-urlencoded, xrefs: 00634A3A
                                                                                        • /api, xrefs: 006349FA
                                                                                        • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36, xrefs: 00634978
                                                                                        • Cookie: __cf_mw_byp=%hs, xrefs: 00634AC4
                                                                                        • P, xrefs: 006349CA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Http$CloseHandleRequest_strlen$DataOpen$AvailableConnectHeadersQueryReadReceiveResponseSendwsprintf
                                                                                        • String ID: /api$7d98652ded8515eb4124c533a671c7aa$Content-Type: application/x-www-form-urlencoded$Cookie: __cf_mw_byp=%hs$Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36$NmLpQW--spam2$P$POST$act=recive_message&lid=%s&j=%s&ver=4.0
                                                                                        • API String ID: 471639143-2248134418
                                                                                        • Opcode ID: fc53c859ad2e438829d68037decd4b614cad92e6a332a070e19a4dfdfc491412
                                                                                        • Instruction ID: b8899cca75820a90dcc80a1abbd617354f728c1e8b3055f0370fbc324050df5e
                                                                                        • Opcode Fuzzy Hash: fc53c859ad2e438829d68037decd4b614cad92e6a332a070e19a4dfdfc491412
                                                                                        • Instruction Fuzzy Hash: D9D1CFB040D301DFD714EF68D58875AFBE2BF88309F10992EE49987260DB79A549CF86
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 70 616830-616967 call 6387c0 call 63dc70 call 63d76f WinHttpOpen 78 616969 70->78 79 61696b-61699a WinHttpConnect 70->79 80 61699d-6169b4 78->80 79->80 82 6169b6 80->82 83 6169b8-616a08 WinHttpOpenRequest 80->83 84 616a0a-616a1d 82->84 83->84 85 616a21-616a6a WinHttpSendRequest 84->85 86 616a1f 84->86 87 616a6c-616a6f 85->87 86->87 88 616a71-616a8c WinHttpReceiveResponse 87->88 89 616a8e-616a97 87->89 88->89 90 616b78-616b7e 89->90 91 616a9d 89->91 93 616b80-616b92 90->93 94 616b97-616bb5 call 63db80 90->94 92 616aa3-616aba WinHttpQueryDataAvailable 91->92 95 616ac2-616ac8 92->95 96 616abc-616abf 92->96 97 616cca-616cd3 93->97 104 616bb7-616bc9 94->104 105 616bce-616bf5 call 638a50 94->105 99 616aca 95->99 100 616acf-616b05 call 63da6f 95->100 96->95 102 616b6d-616b74 99->102 108 616b12-616b54 WinHttpReadData 100->108 109 616b07-616b10 100->109 102->90 104->97 115 616bf7-616c68 105->115 116 616bf9-616c2a call 6166e0 105->116 111 616b5a-616b5e 108->111 109->111 113 616b60-616b62 111->113 114 616b64-616b68 111->114 113->102 114->92 123 616c78-616c85 115->123 124 616c6a-616c72 WinHttpCloseHandle 115->124 125 616c40-616c5d 116->125 126 616c2c-616c3e 116->126 129 616c87 123->129 130 616c89-616c9c WinHttpCloseHandle 123->130 124->123 128 616c63 125->128 126->128 128->97 131 616c9e-616ca4 129->131 130->131 133 616cb4-616cc8 131->133 134 616ca6-616cae WinHttpCloseHandle 131->134 133->97 134->133
                                                                                        APIs
                                                                                        Strings
                                                                                        • name="atok" value=", xrefs: 00616BFE
                                                                                        • POST, xrefs: 006169BD
                                                                                        • Content-Type: application/x-www-form-urlencoded, xrefs: 00616A0A
                                                                                        • section, xrefs: 00616BD5
                                                                                        • P, xrefs: 0061697F
                                                                                        • /api, xrefs: 006169C3
                                                                                        • act=life, xrefs: 00616A25
                                                                                        • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36, xrefs: 00616924
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Http$CloseHandle$DataOpenRequest$AvailableConnectQueryReadReceiveResponseSend_strlen
                                                                                        • String ID: /api$Content-Type: application/x-www-form-urlencoded$Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36$P$POST$act=life$name="atok" value="$section
                                                                                        • API String ID: 1263869446-691063197
                                                                                        • Opcode ID: 02238c901d6626ea45176d27bc5e63480f05b30fda6ac917f75b7062dd4e5a96
                                                                                        • Instruction ID: cb00718b02a7fb7efbe930febd24a55f6db60327145e74b58fc9a8ff65a22278
                                                                                        • Opcode Fuzzy Hash: 02238c901d6626ea45176d27bc5e63480f05b30fda6ac917f75b7062dd4e5a96
                                                                                        • Instruction Fuzzy Hash: 32F1E1B4904305DFDB04DFA8D8857AEBBF2FB49304F148869E885AB350D7759885CB92
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32(0040B140,000000D4), ref: 00402EE3
                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00402EEA
                                                                                        • VirtualProtect.KERNELBASE(Function_00001450,00001900,00000040,?), ref: 00402F9B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProcProtectVirtual
                                                                                        • String ID: 6$C$H$H$N$R
                                                                                        • API String ID: 2099061454-3578717724
                                                                                        • Opcode ID: fd9408ab7e5d00f357830bdb5bdd11dcfff663c253408a74d7f7ff3ebabf69c4
                                                                                        • Instruction ID: 83caa69867e536e1afae75cfb5f57e71f80edaa2be2ef67d7f05577c5a11efcb
                                                                                        • Opcode Fuzzy Hash: fd9408ab7e5d00f357830bdb5bdd11dcfff663c253408a74d7f7ff3ebabf69c4
                                                                                        • Instruction Fuzzy Hash: 48716065C082DC8DDB02C7FD8956AEDFFF04F6F281F084299D9E5B62D2C1A80A448B75
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExitProcess
                                                                                        • String ID:
                                                                                        • API String ID: 621844428-0
                                                                                        • Opcode ID: 418fa5b5a547eee1bc193c7bb490684fdef9b355f1b5012cdc406bcfbac953ae
                                                                                        • Instruction ID: 7de016cab1561e58a0f9b5886e4bc594eae3d55a8b0c2a431f615f09a0e85f1e
                                                                                        • Opcode Fuzzy Hash: 418fa5b5a547eee1bc193c7bb490684fdef9b355f1b5012cdc406bcfbac953ae
                                                                                        • Instruction Fuzzy Hash: 9A51FFB040C3419FD744EF29D58871EBBE0BB88398F108A2DF4D997291DB78D5898F86
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 253 4020e5-402104 255 402210-40296c GetPEB 253->255 256 40210a-402139 253->256 259 4029ad-402b5c CreateThread 255->259 260 40296e-4029aa call 401430 lstrlenW 255->260 257 402162-40216e 256->257 258 40213b-402147 256->258 261 402170-40217c 257->261 262 40218a-402195 257->262 258->257 263 402149-402154 258->263 265 402b7e-402d41 WaitForSingleObject 259->265 266 402b5e-402b7b Sleep call 401430 259->266 260->259 261->262 267 40217e-402188 261->267 269 4021b1-4021bd 262->269 270 402197-4021a3 262->270 263->257 271 402156-402160 263->271 266->265 275 4021c9-40220b VirtualProtect 267->275 269->275 277 4021bf 269->277 270->269 276 4021a5-4021af 270->276 271->275 276->275 277->275
                                                                                        APIs
                                                                                        • VirtualProtect.KERNELBASE(?,MZx,00000040,?), ref: 00402205
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ProtectVirtual
                                                                                        • String ID: @$MZx
                                                                                        • API String ID: 544645111-3611936126
                                                                                        • Opcode ID: 95af83f2104aaaa3da76ef83d43a014a92a98a406460eb6e6768d5ac93c87a07
                                                                                        • Instruction ID: 30c59e40e861a183148405b154a3570424c34177c9d916102ee33d374d203d4a
                                                                                        • Opcode Fuzzy Hash: 95af83f2104aaaa3da76ef83d43a014a92a98a406460eb6e6768d5ac93c87a07
                                                                                        • Instruction Fuzzy Hash: C211B971A14128CBDB68CB14CED4BE9F7B2BB64304F1481D9968DBB285C6B85EC0CF54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetEnvironmentStringsW.KERNEL32(?,00654FF0,0063C3EA,?,00654FF0,0063C521,0064C3D2,?,00654FF0,0000000B,0000000B,?,0064C495,00000100,?,00654FF0), ref: 00647695
                                                                                        • _free.LIBCMT ref: 006476CE
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000,00000000,?,0064C495,00000100,?,00654FF0,00000000,0000000B,0000000B,?,0064C392,?,00000000,?,00000001), ref: 006476D5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: EnvironmentStrings$Free_free
                                                                                        • String ID:
                                                                                        • API String ID: 2716640707-0
                                                                                        • Opcode ID: f5b799155ea03a5f26cab2a10eb476b2de4036e093822ac31614db81337ee521
                                                                                        • Instruction ID: d195699fb030a0c7ce34a49c5caa654b19a4a473f70f173692497976b729dfbe
                                                                                        • Opcode Fuzzy Hash: f5b799155ea03a5f26cab2a10eb476b2de4036e093822ac31614db81337ee521
                                                                                        • Instruction Fuzzy Hash: 09E06567548F262A9362323D7C8A9AB1A0B8BC16B5B260129F41552692EF514D0241B9
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 292 642a2b-642a30 293 642a32-642a4a 292->293 294 642a4c-642a50 293->294 295 642a58-642a61 293->295 294->295 296 642a52-642a56 294->296 297 642a73 295->297 298 642a63-642a66 295->298 300 642ad1-642ad5 296->300 299 642a75-642a82 GetStdHandle 297->299 301 642a6f-642a71 298->301 302 642a68-642a6d 298->302 303 642a84-642a86 299->303 304 642a91 299->304 300->293 305 642adb-642ade 300->305 301->299 302->299 303->304 306 642a88-642a8f GetFileType 303->306 307 642a93-642a95 304->307 306->307 308 642a97-642aa0 307->308 309 642ab3-642ac5 307->309 310 642aa2-642aa6 308->310 311 642aa8-642aab 308->311 309->300 312 642ac7-642aca 309->312 310->300 311->300 313 642aad-642ab1 311->313 312->300 313->300
                                                                                        APIs
                                                                                        • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,0064291A,00658EA0,0000000C), ref: 00642A77
                                                                                        • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,0064291A,00658EA0,0000000C), ref: 00642A89
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: FileHandleType
                                                                                        • String ID:
                                                                                        • API String ID: 3000768030-0
                                                                                        • Opcode ID: 4e4943fafabeae1359d37af211bac77710facbc28fb6f744839512697696aa49
                                                                                        • Instruction ID: 7be4cf7d504cd01478920d7e22ddb96e4e5f34a2e3afb22af6323e2f0f348e4d
                                                                                        • Opcode Fuzzy Hash: 4e4943fafabeae1359d37af211bac77710facbc28fb6f744839512697696aa49
                                                                                        • Instruction Fuzzy Hash: 851184715147438AC7308A3E8CAC662BA97A796331F780B1AFCB6C76F1D730D9C69641
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 332 645381-64538e call 645515 334 645393-64539e 332->334 335 6453a4-6453ac 334->335 336 6453a0-6453a2 334->336 337 6453ae-6453b2 335->337 338 6453ef-6453fb call 6432e2 335->338 336->338 339 6453b4-6453e9 call 641fd3 337->339 344 6453eb-6453ee 339->344 344->338
                                                                                        APIs
                                                                                          • Part of subcall function 00645515: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00642541,00000001,00000364,00000007,000000FF,?,?,?,0063C29E,00643AC2), ref: 00645556
                                                                                        • _free.LIBCMT ref: 006453F0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap_free
                                                                                        • String ID:
                                                                                        • API String ID: 614378929-0
                                                                                        • Opcode ID: ed3bd34655073e7c18eb9f1d0365a39b0480a86c0ef29cbef0eecd8aa98e35c3
                                                                                        • Instruction ID: 763b89a5ed144c9821e59ac59ffcecb32f7fa7e356ea290ba3a422e878d6266a
                                                                                        • Opcode Fuzzy Hash: ed3bd34655073e7c18eb9f1d0365a39b0480a86c0ef29cbef0eecd8aa98e35c3
                                                                                        • Instruction Fuzzy Hash: 4C0145726007166BC721CF68C8819DAFBD9EB053B0F14022DE546AB6C1E3B0AD11CBA4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 345 645515-645520 346 645522-64552c 345->346 347 64552e-645534 345->347 346->347 348 645562-64556d call 63c299 346->348 349 645536-645537 347->349 350 64554d-64555e RtlAllocateHeap 347->350 355 64556f-645571 348->355 349->350 351 645560 350->351 352 645539-645540 call 63d1a4 350->352 351->355 352->348 358 645542-64554b call 6435a5 352->358 358->348 358->350
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00642541,00000001,00000364,00000007,000000FF,?,?,?,0063C29E,00643AC2), ref: 00645556
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: b717d162dd7ea660d43d9f7780c389ed886c1a2904d022152e19c4aaa7cd2bbe
                                                                                        • Instruction ID: 2de0f85c6795b60218dc992b7d8f27d947812f3f05b64548ba295c320156594d
                                                                                        • Opcode Fuzzy Hash: b717d162dd7ea660d43d9f7780c389ed886c1a2904d022152e19c4aaa7cd2bbe
                                                                                        • Instruction Fuzzy Hash: 53F0E031505B2477DB29AF626C05BBA37579F41770F189011B80FA7242CE30DD0146E0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 361 643a7f-643a8b 362 643abd-643ac8 call 63c299 361->362 363 643a8d-643a8f 361->363 370 643aca-643acc 362->370 365 643a91-643a92 363->365 366 643aa8-643ab9 RtlAllocateHeap 363->366 365->366 367 643a94-643a9b call 63d1a4 366->367 368 643abb 366->368 367->362 373 643a9d-643aa6 call 6435a5 367->373 368->370 373->362 373->366
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(00000000,?), ref: 00643AB1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: 3d2441a5085e2511c7f750a539afac108457b2be8ec99d69c54cb52c329a780e
                                                                                        • Instruction ID: 8d7d7c590232f93c1ab2e69df1e2c23c6c0803ed113eb268881d58249c1c252f
                                                                                        • Opcode Fuzzy Hash: 3d2441a5085e2511c7f750a539afac108457b2be8ec99d69c54cb52c329a780e
                                                                                        • Instruction Fuzzy Hash: 81E065311856356BE7217B669C04B9B7A4B9F413B1F150121FD85AA3D0CF11DF8152E5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 376 4054f9-40551b HeapCreate 377 40551d-40551e 376->377 378 40551f-405528 376->378
                                                                                        APIs
                                                                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040550E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 10892065-0
                                                                                        • Opcode ID: 346172c717b8bf92eafb1f4e2d3afe935f66196829703aed5daf7b8231fe5198
                                                                                        • Instruction ID: 5fb17f15b641ed3e70dae3670be4cfefbf906177b8503d1774ee76058e28c1fa
                                                                                        • Opcode Fuzzy Hash: 346172c717b8bf92eafb1f4e2d3afe935f66196829703aed5daf7b8231fe5198
                                                                                        • Instruction Fuzzy Hash: F2D05E365A0305AAEB105F716D087633BDCD794795F008437B94DC7190F6B4CA408A58
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 379 63d6c5-63d6d8 call 6432e2 381 63d6dd-63d6df 379->381
                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 0063D6D8
                                                                                          • Part of subcall function 006432E2: RtlFreeHeap.NTDLL(00000000,00000000,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?), ref: 006432F8
                                                                                          • Part of subcall function 006432E2: GetLastError.KERNEL32(?,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?,?), ref: 0064330A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorFreeHeapLast_free
                                                                                        • String ID:
                                                                                        • API String ID: 1353095263-0
                                                                                        • Opcode ID: dce263dd2b66d3c46ff005e6ef609abf1673b38a8881bd7193a125253371cea2
                                                                                        • Instruction ID: 6082ab999776b384e1944e652c9beede92249756a7fc3a05908119d85e4237ee
                                                                                        • Opcode Fuzzy Hash: dce263dd2b66d3c46ff005e6ef609abf1673b38a8881bd7193a125253371cea2
                                                                                        • Instruction Fuzzy Hash: 04C04C71500308BBDB05AB55D947A4E7BA9DB80364F204058F41557251DAB2EF449694
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 382 403520-403535 FreeConsole
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ConsoleFree
                                                                                        • String ID:
                                                                                        • API String ID: 771614528-0
                                                                                        • Opcode ID: a722221aecd90878a92c137ed78de4bd73bacce319688a350687ea725cbbab87
                                                                                        • Instruction ID: 03b9cb923caf997e63203068c1baaa256c05f53771f476961164ec71a74f90d0
                                                                                        • Opcode Fuzzy Hash: a722221aecd90878a92c137ed78de4bd73bacce319688a350687ea725cbbab87
                                                                                        • Instruction Fuzzy Hash: CBB09BB4411208F7C700DB95CB0884F77FCD604245B104454B60063344CB759A046BA8
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 005E66D0: ExitProcess.KERNEL32 ref: 005E6735
                                                                                          • Part of subcall function 005E1300: GetUserNameW.ADVAPI32 ref: 005E1331
                                                                                        • ExitProcess.KERNEL32 ref: 0062F786
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExitProcess$NameUser
                                                                                        • String ID:
                                                                                        • API String ID: 2325108642-0
                                                                                        • Opcode ID: 6216bb5dd6ea6d133f21f2723c2bac043484e50100ddc3430b66d5d4329cd7b4
                                                                                        • Instruction ID: 9c3e647d7b681ec6f5ae65baab92956104293f8fe4691e5fe4ffd670e5d9509a
                                                                                        • Opcode Fuzzy Hash: 6216bb5dd6ea6d133f21f2723c2bac043484e50100ddc3430b66d5d4329cd7b4
                                                                                        • Instruction Fuzzy Hash: 41B0123010496356C6843FF3540F30C2D137F407C3F000404F184304438C104040897F
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: lstrlen$lstrcat
                                                                                        • String ID: !@$LOCK$\??\$kernel32.dll$ntdll.dll
                                                                                        • API String ID: 493641738-3540211561
                                                                                        • Opcode ID: 78be359ce245682b9bc5513931c511ff44dff1d49e4b4675f6247124ef2c46b4
                                                                                        • Instruction ID: c4a56c31fc3ac3ced7c4a4c175ab53e82d6d43c4d000be0bdeb4cbfff139aea4
                                                                                        • Opcode Fuzzy Hash: 78be359ce245682b9bc5513931c511ff44dff1d49e4b4675f6247124ef2c46b4
                                                                                        • Instruction Fuzzy Hash: 9D12E2B55097008FD344DF68D58962ABBF1BB88314F108A2EF9A9873A0DB79D945CF42
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        • <, xrefs: 0061627E
                                                                                        • Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36, xrefs: 00616235
                                                                                        • <, xrefs: 0061628B
                                                                                        • GET, xrefs: 006163BA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Http$AvailableCloseConnectCrackDataHandleOpenQueryReceiveRequestResponseSend
                                                                                        • String ID: <$<$GET$Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        • API String ID: 3296817014-3606546913
                                                                                        • Opcode ID: 96348d2977383917aeb529feb6962b63268f106c0c6803baa6f94155dcb2fe9b
                                                                                        • Instruction ID: 3ff820cb6f35adc3bd0b8ef34d29ca9a2e879046c94f6136f14d78a352a2da66
                                                                                        • Opcode Fuzzy Hash: 96348d2977383917aeb529feb6962b63268f106c0c6803baa6f94155dcb2fe9b
                                                                                        • Instruction Fuzzy Hash: 92B1C0B4508340CFD354DF68C19879FBBE2BB88718F148A2DF49997290D7749989CF86
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Heap$Process$Alloc$Free$BitsObjectRelease
                                                                                        • String ID:
                                                                                        • API String ID: 332556478-0
                                                                                        • Opcode ID: 9068878c93a2f661586dbc959bf0c79411b4ca97070b601377d5a47e703eba87
                                                                                        • Instruction ID: 89a2520d6362708cf600f29543d4e3b09f8a5a9d2d8a19792b7057088605d8be
                                                                                        • Opcode Fuzzy Hash: 9068878c93a2f661586dbc959bf0c79411b4ca97070b601377d5a47e703eba87
                                                                                        • Instruction Fuzzy Hash: 99F16F76A00A218FD708DF78C84565ABBF2FF89320F158369E965EB3E4D7349C418B81
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • IsDebuggerPresent.KERNEL32 ref: 00409730
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00409745
                                                                                        • UnhandledExceptionFilter.KERNEL32(0040C254), ref: 00409750
                                                                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 0040976C
                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 00409773
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                        • String ID:
                                                                                        • API String ID: 2579439406-0
                                                                                        • Opcode ID: e439fa4b6ee22d99b4f68d71e246144b19d6780c00354f3e4974276a6dcce2fc
                                                                                        • Instruction ID: 53a8578d4835903f000ab9bc39524206b7cb2b9494f9d1bdc6c6cf89bf368f49
                                                                                        • Opcode Fuzzy Hash: e439fa4b6ee22d99b4f68d71e246144b19d6780c00354f3e4974276a6dcce2fc
                                                                                        • Instruction Fuzzy Hash: 0F21F4B4900204EFC700EF15ED466457BB4FB2A702F10407BE80897371DBB15A858F5D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: MetricsSystem$CreateDelete
                                                                                        • String ID:
                                                                                        • API String ID: 1043530637-0
                                                                                        • Opcode ID: 8d14492d09bcedac9a7ec5f7823532e123b19b08741a280c82d1e4b3afbd981a
                                                                                        • Instruction ID: db05bab9689d55ce213df422c59f5a5f066a0810f0624f0500f6f5c62abb6980
                                                                                        • Opcode Fuzzy Hash: 8d14492d09bcedac9a7ec5f7823532e123b19b08741a280c82d1e4b3afbd981a
                                                                                        • Instruction Fuzzy Hash: C151A2BE42030BABD710FF78D8642D777F2EB2A311F509224E5899B3A4E3750546CB96
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00635D41
                                                                                        • IsDebuggerPresent.KERNEL32 ref: 00635E0D
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00635E26
                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00635E30
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                        • String ID:
                                                                                        • API String ID: 254469556-0
                                                                                        • Opcode ID: a0feeea22cc64c62c8e8b9cae56fdc5e8b5888cbba79aff3199b103fb433c3e1
                                                                                        • Instruction ID: e7c54bf5a6192dee339f39fa7226398e7b291ad62e58d41524894220eee2d27a
                                                                                        • Opcode Fuzzy Hash: a0feeea22cc64c62c8e8b9cae56fdc5e8b5888cbba79aff3199b103fb433c3e1
                                                                                        • Instruction Fuzzy Hash: 8D3106B5D013189BDF21DFA5D949BCDBBB9BF08300F1041AAE40DAB250EB709B858F85
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _strlen.LIBCMT ref: 006158D1
                                                                                          • Part of subcall function 0063D6C5: _free.LIBCMT ref: 0063D6D8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free_strlen
                                                                                        • String ID: K$P
                                                                                        • API String ID: 2535082280-420285281
                                                                                        • Opcode ID: 3ac5170e67a367ff6bc06e6763940ebfda21735f068007c2f3d68ab1e8f1798c
                                                                                        • Instruction ID: d1d7a9d5af9440b3a24238ae23c273cfac5d0a7fc1fd379b19c6f8e02242f773
                                                                                        • Opcode Fuzzy Hash: 3ac5170e67a367ff6bc06e6763940ebfda21735f068007c2f3d68ab1e8f1798c
                                                                                        • Instruction Fuzzy Hash: 55F1E674608781CFD364CF68C084B9AFBE1BFC9304F15895EE89A9B352D7749885CB62
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: BinaryCryptString$_strlen
                                                                                        • String ID:
                                                                                        • API String ID: 1460654939-0
                                                                                        • Opcode ID: 2f6a8bbbbc899c2dc41bbc4b29b5b8bfa4c97f33b5c5c124d963b4ff617d46e9
                                                                                        • Instruction ID: b0f4043bfd5d9ec475f0ea4a028f4b7253ee26fd08069fb1ff1c2a4d1eaeef65
                                                                                        • Opcode Fuzzy Hash: 2f6a8bbbbc899c2dc41bbc4b29b5b8bfa4c97f33b5c5c124d963b4ff617d46e9
                                                                                        • Instruction Fuzzy Hash: A3319BB45097418FD340DF29D18871EBBE1BB88318F10891EF89897350D7B9DA498F87
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLocaleInfoA.KERNEL32(?,00001004,?,00000006,?,?,?,?,?,?,00000000), ref: 00409AB0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 2299586839-0
                                                                                        • Opcode ID: a965f85404f354b67de76e34e14b4e7bb53843fca6730cefa7b47b11aa3bb62b
                                                                                        • Instruction ID: cd97d6e13d0de9e206b852a385487627045e89d73055acfb110a821b9b1a9c63
                                                                                        • Opcode Fuzzy Hash: a965f85404f354b67de76e34e14b4e7bb53843fca6730cefa7b47b11aa3bb62b
                                                                                        • Instruction Fuzzy Hash: E1F06570A04248BFDB00EBA59D05A9E7BF9DB44314F50417AE515EA1C2DB74DA048759
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 0063D6C5: _free.LIBCMT ref: 0063D6D8
                                                                                          • Part of subcall function 005E2AC0: lstrcatW.KERNEL32 ref: 005E2B29
                                                                                          • Part of subcall function 005E2AC0: lstrcatW.KERNEL32 ref: 005E2B41
                                                                                          • Part of subcall function 005E2AC0: lstrcatW.KERNEL32 ref: 005E2B58
                                                                                          • Part of subcall function 005E2AC0: lstrcatW.KERNEL32 ref: 005E2BBA
                                                                                          • Part of subcall function 005E2AC0: lstrcatW.KERNEL32 ref: 005E2BD2
                                                                                          • Part of subcall function 005E2AC0: lstrcatW.KERNEL32 ref: 005E2BE9
                                                                                          • Part of subcall function 005E2AC0: lstrcatW.KERNEL32 ref: 005E2C01
                                                                                          • Part of subcall function 005E2AC0: lstrcatW.KERNEL32 ref: 005E2C18
                                                                                        • lstrcatW.KERNEL32 ref: 005E3177
                                                                                        • lstrcatW.KERNEL32 ref: 005E31A4
                                                                                        • lstrcatW.KERNEL32 ref: 005E31E6
                                                                                        • lstrcatW.KERNEL32 ref: 005E31FE
                                                                                        • lstrcatW.KERNEL32 ref: 005E3215
                                                                                        • lstrcatW.KERNEL32 ref: 005E3242
                                                                                        Strings
                                                                                        • 362f0ee17a406988580f4a80424e2ea7595d2ea0554c6194585b, xrefs: 005E3036
                                                                                        • d1ec3fb8feae4dd7a69f5aca95ae, xrefs: 005E321B
                                                                                        • f423d2eaa86fbd89954ff2b9804ca08b93468e869155b7869041, xrefs: 005E317D
                                                                                        • e4154e92ac7c3de68b6737, xrefs: 005E2FA9, 005E307B
                                                                                        • bae785b2ed82e792fe86f1d3, xrefs: 005E30C0
                                                                                        • 6cdb83d922bef7ae03a9e8852fb4ecb205bef0, xrefs: 005E3105
                                                                                        • 22fe32036e91556a4cde7662569f, xrefs: 005E2FF1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: lstrcat$_free
                                                                                        • String ID: 22fe32036e91556a4cde7662569f$362f0ee17a406988580f4a80424e2ea7595d2ea0554c6194585b$6cdb83d922bef7ae03a9e8852fb4ecb205bef0$bae785b2ed82e792fe86f1d3$d1ec3fb8feae4dd7a69f5aca95ae$e4154e92ac7c3de68b6737$f423d2eaa86fbd89954ff2b9804ca08b93468e869155b7869041
                                                                                        • API String ID: 1597172325-1602796456
                                                                                        • Opcode ID: 318acbfc56c428e5fb73ec772b2933049a9bd04799b80be3b4bf4079100fdcf6
                                                                                        • Instruction ID: 3c4356bc6d2ac4b7c4abce6b524c47c1b94ea66cfb91a2cec39475f3051c8f51
                                                                                        • Opcode Fuzzy Hash: 318acbfc56c428e5fb73ec772b2933049a9bd04799b80be3b4bf4079100fdcf6
                                                                                        • Instruction Fuzzy Hash: 691204F4D046059FCB04EFA8E98695EBBF5FF49300F10492DE8899B315E731A958CB92
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ___free_lconv_mon.LIBCMT ref: 006467BF
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 00646092
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 006460A4
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 006460B6
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 006460C8
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 006460DA
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 006460EC
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 006460FE
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 00646110
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 00646122
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 00646134
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 00646146
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 00646158
                                                                                          • Part of subcall function 00646075: _free.LIBCMT ref: 0064616A
                                                                                        • _free.LIBCMT ref: 006467B4
                                                                                          • Part of subcall function 006432E2: RtlFreeHeap.NTDLL(00000000,00000000,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?), ref: 006432F8
                                                                                          • Part of subcall function 006432E2: GetLastError.KERNEL32(?,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?,?), ref: 0064330A
                                                                                        • _free.LIBCMT ref: 006467D6
                                                                                        • _free.LIBCMT ref: 006467EB
                                                                                        • _free.LIBCMT ref: 006467F6
                                                                                        • _free.LIBCMT ref: 00646818
                                                                                        • _free.LIBCMT ref: 0064682B
                                                                                        • _free.LIBCMT ref: 00646839
                                                                                        • _free.LIBCMT ref: 00646844
                                                                                        • _free.LIBCMT ref: 0064687C
                                                                                        • _free.LIBCMT ref: 00646883
                                                                                        • _free.LIBCMT ref: 006468A0
                                                                                        • _free.LIBCMT ref: 006468B8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                        • String ID: (e$he
                                                                                        • API String ID: 161543041-2336485431
                                                                                        • Opcode ID: 492784758deaf0d0661974da81c1914b5fbd763ac10886192ec4a61a853414aa
                                                                                        • Instruction ID: c5c5594161231ddb783fed2ef742e2574d88d95b88516e46a32d75bf2bf03454
                                                                                        • Opcode Fuzzy Hash: 492784758deaf0d0661974da81c1914b5fbd763ac10886192ec4a61a853414aa
                                                                                        • Instruction Fuzzy Hash: 133150316003019FEB65AE78D886B9677EBAF01310F24842EF455D7291DE75EE40CB29
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _strlen
                                                                                        • String ID: Content-Disposition: form-data; name="$"$be85de5ipdocierre1
                                                                                        • API String ID: 4218353326-2800077853
                                                                                        • Opcode ID: 03c53230868a4b6d191d281e534639ebdf42cfdaeb04fd553b701d463dbb0667
                                                                                        • Instruction ID: 4a6f0f9f260ae119b2ecf1a665f8a9f5aa09180275ade37956e2d45417f69786
                                                                                        • Opcode Fuzzy Hash: 03c53230868a4b6d191d281e534639ebdf42cfdaeb04fd553b701d463dbb0667
                                                                                        • Instruction Fuzzy Hash: 489116F5E046119FCB00EF78D885859BBF5FF8A304F1146ADE945AB324E731A818CB92
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _strlen
                                                                                        • String ID: Content-Disposition: form-data; name="$"; f$Content-Type: attachment/x-object$ame=$be85de5ipdocierre1$file$ilen
                                                                                        • API String ID: 4218353326-555925414
                                                                                        • Opcode ID: 91d720d70681f4d8ee5c40b1aaf18837c9369eaf168117dd3a205ad64ce16e8e
                                                                                        • Instruction ID: 2beb9cad0abd9e7daf39f99876cd5e631c20945e81f4f211da114517e3a5b3c8
                                                                                        • Opcode Fuzzy Hash: 91d720d70681f4d8ee5c40b1aaf18837c9369eaf168117dd3a205ad64ce16e8e
                                                                                        • Instruction Fuzzy Hash: D14166F6910615AFC762DF04EC86E5677E4FF16308B094168E8098B30AE735F619CB97
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0040C310,0000000C,004051FE,00000000,00000000,?,00404543,00000003,?,?,?,?,?,?,0040401B), ref: 004050D5
                                                                                        • __crt_waiting_on_module_handle.LIBCMT ref: 004050E0
                                                                                          • Part of subcall function 004041D5: Sleep.KERNEL32(000003E8,00000000,?,00405026,KERNEL32.DLL,?,00405072,?,00404543,00000003), ref: 004041E1
                                                                                          • Part of subcall function 004041D5: GetModuleHandleW.KERNEL32(?,?,00405026,KERNEL32.DLL,?,00405072,?,00404543,00000003,?,?,?,?,?,?,0040401B), ref: 004041EA
                                                                                        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00405109
                                                                                        • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00405119
                                                                                        • __lock.LIBCMT ref: 0040513B
                                                                                        • InterlockedIncrement.KERNEL32(004921F0), ref: 00405148
                                                                                        • __lock.LIBCMT ref: 0040515C
                                                                                        • ___addlocaleref.LIBCMT ref: 0040517A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                                                        • String ID: 'I$DecodePointer$EncodePointer$KERNEL32.DLL
                                                                                        • API String ID: 1028249917-1081375787
                                                                                        • Opcode ID: 40474d4922cdbc7b7b9f4ecfa6fffe8a2f1e0e6e1ffd086e7c8c2280af1a5aac
                                                                                        • Instruction ID: 65e6684043b26e880ef1d5393acb9a614fc661c3aa4d4bf651c2f4caaf7348c1
                                                                                        • Opcode Fuzzy Hash: 40474d4922cdbc7b7b9f4ecfa6fffe8a2f1e0e6e1ffd086e7c8c2280af1a5aac
                                                                                        • Instruction Fuzzy Hash: C2115B70940B05EAD7209F669945B5BBBE4EF44314F20453FE4A9B72E1CB7899408F9C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • wsprintfW.USER32 ref: 00617D37
                                                                                        • wsprintfW.USER32 ref: 00617DB2
                                                                                        • WinHttpAddRequestHeaders.WINHTTP ref: 00617DD7
                                                                                          • Part of subcall function 0063D6C5: _free.LIBCMT ref: 0063D6D8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: wsprintf$HeadersHttpRequest_free
                                                                                        • String ID: Content-Type: multipart/form-data; boundary=%s$Cookie: __cf_mw_byp=%hs$Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36$P$POST$be85de5ipdocierre1$winhttp.dll
                                                                                        • API String ID: 2458437650-2783096789
                                                                                        • Opcode ID: a4fb85a0dff8b3bc0fb54ab6b5acfd96adddc1098040dc5830a65eb03666e616
                                                                                        • Instruction ID: 2e6a8a2b4d74aff38a4d25367d9ea37c89fa3bc450ca96aaee1b89628ebcd4f2
                                                                                        • Opcode Fuzzy Hash: a4fb85a0dff8b3bc0fb54ab6b5acfd96adddc1098040dc5830a65eb03666e616
                                                                                        • Instruction Fuzzy Hash: CDA189B480C3059FD714EF68D58465AFBF2EF88708F41892EE89987350D7789989CF86
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • lstrcatW.KERNEL32(00000000,?), ref: 005E2A33
                                                                                        • lstrcatW.KERNEL32(00000000,00000000), ref: 005E2A46
                                                                                          • Part of subcall function 0063D6C5: _free.LIBCMT ref: 0063D6D8
                                                                                        • lstrcatW.KERNEL32(00000000,?), ref: 005E2A56
                                                                                        • lstrcatW.KERNEL32(00000000,?), ref: 005E2A6C
                                                                                        • lstrcatW.KERNEL32(00000000,006500F2), ref: 005E2A74
                                                                                        • lstrcatW.KERNEL32(00000000,?), ref: 005E2A7A
                                                                                        • lstrcatW.KERNEL32(00000000,00000000), ref: 005E2A8D
                                                                                        • lstrcatW.KERNEL32(00000000,?), ref: 005E2A9D
                                                                                        Strings
                                                                                        • aab58e5185f0f625cfdbfd38c5dbfd7e, xrefs: 005E2A7C
                                                                                        • 45538e52191fe131243fae173d27eb3c363ae13c6500eb26313ae035360f, xrefs: 005E2A35
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: lstrcat$_free
                                                                                        • String ID: 45538e52191fe131243fae173d27eb3c363ae13c6500eb26313ae035360f$aab58e5185f0f625cfdbfd38c5dbfd7e
                                                                                        • API String ID: 1597172325-820533355
                                                                                        • Opcode ID: 5ced345bc4107bb35b23700bbbd15a81d001e9a32c0de97c651556b47af0a594
                                                                                        • Instruction ID: c53fab48c544440b0381daaf1a966e44991803cad897e499930291ad89b75063
                                                                                        • Opcode Fuzzy Hash: 5ced345bc4107bb35b23700bbbd15a81d001e9a32c0de97c651556b47af0a594
                                                                                        • Instruction Fuzzy Hash: A201B9B2A402043BEA5137A1AC47F7F391EDF87B98F050028FA0856183E957C91593BB
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 006426C6
                                                                                          • Part of subcall function 006432E2: RtlFreeHeap.NTDLL(00000000,00000000,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?), ref: 006432F8
                                                                                          • Part of subcall function 006432E2: GetLastError.KERNEL32(?,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?,?), ref: 0064330A
                                                                                        • _free.LIBCMT ref: 006426D2
                                                                                        • _free.LIBCMT ref: 006426DD
                                                                                        • _free.LIBCMT ref: 006426E8
                                                                                        • _free.LIBCMT ref: 006426F3
                                                                                        • _free.LIBCMT ref: 006426FE
                                                                                        • _free.LIBCMT ref: 00642709
                                                                                        • _free.LIBCMT ref: 00642714
                                                                                        • _free.LIBCMT ref: 0064271F
                                                                                        • _free.LIBCMT ref: 0064272D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: d774668c325f9847c79d2514e2832a2b96a87705d2f6f2ba16a6919019332a12
                                                                                        • Instruction ID: 34187b48ea8809b4481693b79e2764b3e4d44d9a656741a5db6d027d5449a27c
                                                                                        • Opcode Fuzzy Hash: d774668c325f9847c79d2514e2832a2b96a87705d2f6f2ba16a6919019332a12
                                                                                        • Instruction Fuzzy Hash: CF21AD76900218AFCB41EFA4C842DDE7BB5FF08340F514169F9169B225DB71DB54CB84
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • type_info::operator==.LIBVCRUNTIME ref: 0064D104
                                                                                        • CatchIt.LIBVCRUNTIME ref: 0064D263
                                                                                        • _UnwindNestedFrames.LIBCMT ref: 0064D364
                                                                                        • CallUnexpected.LIBVCRUNTIME ref: 0064D37F
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CallCatchFramesNestedUnexpectedUnwindtype_info::operator==
                                                                                        • String ID: csm$csm$csm$x2e
                                                                                        • API String ID: 2332921423-1529522478
                                                                                        • Opcode ID: 694f5d5656856fdc9d691de5e56fd552bf0d3576e1afe8599bfd75c1aac1cb08
                                                                                        • Instruction ID: 3a58c1b7365e5a78bd551b28ac1cdafffd5905d1f5954bc04d153cdbc830b78a
                                                                                        • Opcode Fuzzy Hash: 694f5d5656856fdc9d691de5e56fd552bf0d3576e1afe8599bfd75c1aac1cb08
                                                                                        • Instruction Fuzzy Hash: ABB13371C00209EFCF69EFA4C8819EEBBB6BF05310F14415AE9156B312D771EA51CBA6
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: lstrcatlstrlen$_free
                                                                                        • String ID: kernel32.dll
                                                                                        • API String ID: 2325961074-1793498882
                                                                                        • Opcode ID: 111db9b7c6f5bebfaa124431e00bf7510bfc5de75fb1db980ae695a19187a76f
                                                                                        • Instruction ID: 729bea22f832237fc0c47a7c71913d9bc5c031d7ce94b7a1b7660ccde8612df8
                                                                                        • Opcode Fuzzy Hash: 111db9b7c6f5bebfaa124431e00bf7510bfc5de75fb1db980ae695a19187a76f
                                                                                        • Instruction Fuzzy Hash: 29C1AAB4509345DFE714EF68D188A2ABBE1BB88304F108D1EF58987351DB78DA84DB86
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • lstrcatW.KERNEL32(00000000,\??\), ref: 005F284B
                                                                                        • lstrcatW.KERNEL32(00000000,?), ref: 005F2852
                                                                                        • lstrlenW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,005F29D6), ref: 005F285B
                                                                                        • lstrlenW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,005F29D6), ref: 005F287C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: lstrcatlstrlen
                                                                                        • String ID: \??\$kernel32.dll$ntdll.dll
                                                                                        • API String ID: 1475610065-320376045
                                                                                        • Opcode ID: 8079b3e30117715171f709b22318fa01dc59826c3e635a19bf39635508d817c1
                                                                                        • Instruction ID: 74e03f5965f6df9cdb49b686c1b363e858a5291a76989855be4085a9424cb171
                                                                                        • Opcode Fuzzy Hash: 8079b3e30117715171f709b22318fa01dc59826c3e635a19bf39635508d817c1
                                                                                        • Instruction Fuzzy Hash: F331DB72B907057BE7245674AC03F5A7A969FC5B04F04C038FB44AF2C1EAB99A44479A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: DirectoryInformationVolumeWindowswsprintf
                                                                                        • String ID: :$C$\$l2%08x%08x%04x%xu
                                                                                        • API String ID: 3001812590-1811320126
                                                                                        • Opcode ID: e98950fd27e8df95f05069b474de48f2465db02aaeb117bf5531ed8151ea7a43
                                                                                        • Instruction ID: 3218f050e41d9a08d75778ba8810942aff779ddf3c4c486c7987eddc0672f761
                                                                                        • Opcode Fuzzy Hash: e98950fd27e8df95f05069b474de48f2465db02aaeb117bf5531ed8151ea7a43
                                                                                        • Instruction Fuzzy Hash: 6D41CCB04097508BD300EF64D0987AEBBE1BF88718F105D2EE0C997290E779D6898F87
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free
                                                                                        • String ID:
                                                                                        • API String ID: 269201875-0
                                                                                        • Opcode ID: f378b90c89bacbf44f7850f70c145c8dc4ac7ae9e401386983b17de369091da8
                                                                                        • Instruction ID: 736a4aff18bcb045fdd42245afaff69dcb53e40a7304324869448c0fb0063884
                                                                                        • Opcode Fuzzy Hash: f378b90c89bacbf44f7850f70c145c8dc4ac7ae9e401386983b17de369091da8
                                                                                        • Instruction Fuzzy Hash: C26108729083119FDB25BFB89886AAA77E7EF00321F14456DF91597381EB71DA00CB98
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: lstrcat
                                                                                        • String ID:
                                                                                        • API String ID: 4038537762-0
                                                                                        • Opcode ID: 2919e91c1acab646083f2c8d7558a89ca65632c6ffef4febad43e4f852ea6dca
                                                                                        • Instruction ID: fb7be0e319200c9de8d0b2ab7b54612539affd665b0c52de986c6fecf215ee19
                                                                                        • Opcode Fuzzy Hash: 2919e91c1acab646083f2c8d7558a89ca65632c6ffef4febad43e4f852ea6dca
                                                                                        • Instruction Fuzzy Hash: 6B61F5B4905605DFCB00EFA8E98566ABFF5FF49301F10882DE889A7304E735A954CF96
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: lstrcat
                                                                                        • String ID:
                                                                                        • API String ID: 4038537762-0
                                                                                        • Opcode ID: 7b004b17836f87cd3522d6bca3b1d3727411ba5fa4752b6d4548a60c4b8c83db
                                                                                        • Instruction ID: 20a0f840d3b0eddc731e712da2a6c8234492b49dd41677eba09afa66e9c9718d
                                                                                        • Opcode Fuzzy Hash: 7b004b17836f87cd3522d6bca3b1d3727411ba5fa4752b6d4548a60c4b8c83db
                                                                                        • Instruction Fuzzy Hash: 4B51D6B49042019FCB00EFA8D98566EBFF5FF49311F11882DE889A7304E735A954CB96
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: api-ms-$ext-ms-
                                                                                        • API String ID: 0-537541572
                                                                                        • Opcode ID: 069e9cf165656ecd7d1d4ba89797855c829f40bb5e4a6978d8d4903bc55a5058
                                                                                        • Instruction ID: dcf94017fa01d77fd0dc781f772bced19c3dd1d49a3f8c6706ecc5fec848a8a7
                                                                                        • Opcode Fuzzy Hash: 069e9cf165656ecd7d1d4ba89797855c829f40bb5e4a6978d8d4903bc55a5058
                                                                                        • Instruction Fuzzy Hash: 7421E732A01727ABDB319B24DC51A6A376BAF557A1F760510FF16B7390DA30DD00C6E0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 006462C0: _free.LIBCMT ref: 006462E5
                                                                                        • _free.LIBCMT ref: 0064622A
                                                                                          • Part of subcall function 006432E2: RtlFreeHeap.NTDLL(00000000,00000000,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?), ref: 006432F8
                                                                                          • Part of subcall function 006432E2: GetLastError.KERNEL32(?,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?,?), ref: 0064330A
                                                                                        • _free.LIBCMT ref: 00646235
                                                                                        • _free.LIBCMT ref: 00646240
                                                                                        • _free.LIBCMT ref: 00646294
                                                                                        • _free.LIBCMT ref: 0064629F
                                                                                        • _free.LIBCMT ref: 006462AA
                                                                                        • _free.LIBCMT ref: 006462B5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: d164b0b78da03c00ad40bd89565399c3cde5271e9215c4906fabfbff84f000e5
                                                                                        • Instruction ID: 7f95490992ec7106791ce25c637a4b230799660521df0fa53322138793d71524
                                                                                        • Opcode Fuzzy Hash: d164b0b78da03c00ad40bd89565399c3cde5271e9215c4906fabfbff84f000e5
                                                                                        • Instruction Fuzzy Hash: C5113371540B14BAD7A0BBB0CC47FCB779E9F05700F40491DB29B66152DAB6F7084759
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • CreateCompatibleDC.GDI32(?), ref: 00630269
                                                                                        • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0063027A
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00630284
                                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 006302A3
                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 006302AB
                                                                                        • DeleteDC.GDI32(00000000), ref: 006302B2
                                                                                        • DeleteObject.GDI32(00000000), ref: 006302B9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Object$CompatibleCreateDeleteSelect$Bitmap
                                                                                        • String ID:
                                                                                        • API String ID: 1142853709-0
                                                                                        • Opcode ID: 62f8007d5a5231a9d6f2802ccd12e2d3d96b7ca34d79d24d0decb424320fa55d
                                                                                        • Instruction ID: 7d009ef98593d25ca860687e374f1da65c8a207f0df1732179faf117e438d283
                                                                                        • Opcode Fuzzy Hash: 62f8007d5a5231a9d6f2802ccd12e2d3d96b7ca34d79d24d0decb424320fa55d
                                                                                        • Instruction Fuzzy Hash: 3AF03A32201314BFE3119BE0AC08F6F7BAEEB89B56F141418FA45A2560CE765D018B65
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,0063B5B2,?,?,0063B652,?,00000800,?), ref: 0063B53D
                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0063B550
                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,0063B5B2,?,?,0063B652,?,00000800,?), ref: 0063B573
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                        • String ID: CorExitProcess$E_c$mscoree.dll
                                                                                        • API String ID: 4061214504-1619500404
                                                                                        • Opcode ID: ea9b498b403018656ee402402ca650c736481424c31aa1b5d6e56590a6f84ee5
                                                                                        • Instruction ID: cf5ce5d2262424d53187bf93c8d6adb02370ff89ac21ccbbfa399610c3da2863
                                                                                        • Opcode Fuzzy Hash: ea9b498b403018656ee402402ca650c736481424c31aa1b5d6e56590a6f84ee5
                                                                                        • Instruction Fuzzy Hash: 56F0F831A4161AFBDB11DB50DD1ABDEBF6AAB40767F106060B901A22A0CF709F04DBD0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetConsoleOutputCP.KERNEL32(00658D38,00000010,?), ref: 006458F7
                                                                                        • __fassign.LIBCMT ref: 00645ADC
                                                                                        • __fassign.LIBCMT ref: 00645AF9
                                                                                        • WriteFile.KERNEL32(?,0063D33D,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00645B41
                                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00645B81
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00645C29
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                                        • String ID:
                                                                                        • API String ID: 1735259414-0
                                                                                        • Opcode ID: 47b96a28455823e841b377b07ad67df00a92583a5cced2e7143b753ec073b7f6
                                                                                        • Instruction ID: ec00b920f6669cce16e2306670fda48c41d6cac0129e7c703751f1d666351f47
                                                                                        • Opcode Fuzzy Hash: 47b96a28455823e841b377b07ad67df00a92583a5cced2e7143b753ec073b7f6
                                                                                        • Instruction Fuzzy Hash: 7FC17B71D0065C9FCF15CFA8C8809EDBBB6EF49314F28416AE856B7342D631AE46CB60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __allrem.LIBCMT ref: 0063C99C
                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0063C9B8
                                                                                        • __allrem.LIBCMT ref: 0063C9CF
                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0063C9ED
                                                                                        • __allrem.LIBCMT ref: 0063CA04
                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0063CA22
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                        • String ID:
                                                                                        • API String ID: 1992179935-0
                                                                                        • Opcode ID: 035d5d02f106e27210bc6c75645dd62f74e9946861f904db9f30dac8308f9d2d
                                                                                        • Instruction ID: a23b6ea7db43811f6c264022ea6af42ae133953defbba53840483f35128e54c2
                                                                                        • Opcode Fuzzy Hash: 035d5d02f106e27210bc6c75645dd62f74e9946861f904db9f30dac8308f9d2d
                                                                                        • Instruction Fuzzy Hash: 1B81D57260070A9BD724EF69CC42B9A77ABAF44370F24462EF515E7781EB71DA008BD4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,00641982,00636331,00635E91), ref: 00641999
                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 006419A7
                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 006419C0
                                                                                        • SetLastError.KERNEL32(00000000,00641982,00636331,00635E91), ref: 00641A12
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                        • String ID:
                                                                                        • API String ID: 3852720340-0
                                                                                        • Opcode ID: 98bdc5c11b81c16a48f5abaa7432e028efda0ebfbc1dc5a503dacce1997e0228
                                                                                        • Instruction ID: 629be910f55e07593347822e40b2a2835b619eacd165079270da7871c57386f6
                                                                                        • Opcode Fuzzy Hash: 98bdc5c11b81c16a48f5abaa7432e028efda0ebfbc1dc5a503dacce1997e0228
                                                                                        • Instruction Fuzzy Hash: D601D47210EB116EAB746AB4BC869AB2A97DB03376F21022DF5115A2F1EF114C91D29C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AdjustPointer
                                                                                        • String ID: E_c
                                                                                        • API String ID: 1740715915-1619584832
                                                                                        • Opcode ID: 287e6187000297798069697aaf8f743c67d6c01545924170c39db56b9d10d030
                                                                                        • Instruction ID: a626105177682dea4bc626645f4af6d4bea376617683e6b2fd631aa94ad7f01d
                                                                                        • Opcode Fuzzy Hash: 287e6187000297798069697aaf8f743c67d6c01545924170c39db56b9d10d030
                                                                                        • Instruction Fuzzy Hash: 1151F372A03606AFDBA99F14C841BFA7BA7EF40720F24402DE901577A1EB31EC50DB94
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: ,Pe
                                                                                        • API String ID: 0-1232449045
                                                                                        • Opcode ID: 8b0bf92bb0368402f85ad83e5d2765506d20ea7864c94bd4d9989b9374a566f0
                                                                                        • Instruction ID: a72520732d95c78a5f65802ac02ec40ee5fb9d813b266f717174a5e693160a9e
                                                                                        • Opcode Fuzzy Hash: 8b0bf92bb0368402f85ad83e5d2765506d20ea7864c94bd4d9989b9374a566f0
                                                                                        • Instruction Fuzzy Hash: AA41F7B2A14744AFD7289F78CC41BAABBABEF88720F10456EF015DB781D771A94187C0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0063651F
                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 006365D3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                                        • String ID: E_c$Xbc$csm
                                                                                        • API String ID: 3480331319-1669314325
                                                                                        • Opcode ID: 05ffe7cccec82c66257cd67115d8187278a9e481c0d0890ee9b9bd60d9edbb1a
                                                                                        • Instruction ID: 1611b1e4a08311fe88178dc1048047a1c158b684d823fcce7cb1b59047f5f15e
                                                                                        • Opcode Fuzzy Hash: 05ffe7cccec82c66257cd67115d8187278a9e481c0d0890ee9b9bd60d9edbb1a
                                                                                        • Instruction Fuzzy Hash: D941AE74E00208ABCF10DF68C885A9EBBA6EF45368F14C169F8149B396D771EA55CBD0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __getptd.LIBCMT ref: 00407420
                                                                                          • Part of subcall function 00405223: __getptd_noexit.LIBCMT ref: 00405226
                                                                                          • Part of subcall function 00405223: __amsg_exit.LIBCMT ref: 00405233
                                                                                        • __getptd.LIBCMT ref: 00407437
                                                                                        • __amsg_exit.LIBCMT ref: 00407445
                                                                                        • __lock.LIBCMT ref: 00407455
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                                        • String ID: 'I
                                                                                        • API String ID: 3521780317-315217059
                                                                                        • Opcode ID: 5867f47dbfe5789569832cb492f98da929baff1a2f191deade0b37e63fb29646
                                                                                        • Instruction ID: 912585c7354783b5949b1c1bd1bcd633861af4d054bd02f1fd175d32d3ff9c8c
                                                                                        • Opcode Fuzzy Hash: 5867f47dbfe5789569832cb492f98da929baff1a2f191deade0b37e63fb29646
                                                                                        • Instruction Fuzzy Hash: 9AF04F31D44A04ABD610FBA5A402B5E36A0AB10758F11867FE450B72D2CB7C6801DE9E
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __getptd.LIBCMT ref: 0040685D
                                                                                          • Part of subcall function 00405223: __getptd_noexit.LIBCMT ref: 00405226
                                                                                          • Part of subcall function 00405223: __amsg_exit.LIBCMT ref: 00405233
                                                                                        • __amsg_exit.LIBCMT ref: 0040687D
                                                                                        • __lock.LIBCMT ref: 0040688D
                                                                                        • InterlockedDecrement.KERNEL32(?), ref: 004068AA
                                                                                        • InterlockedIncrement.KERNEL32(00691690), ref: 004068D5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                                        • String ID:
                                                                                        • API String ID: 4271482742-0
                                                                                        • Opcode ID: de6548d9f3e01a0b0ac61b5d74d5a1776b51bbe6e2add367b7cd577da426ec69
                                                                                        • Instruction ID: 04d54f8b60d6333cd578d7fdbaf3af9e196ee5311d866156874deb98f7f81dd5
                                                                                        • Opcode Fuzzy Hash: de6548d9f3e01a0b0ac61b5d74d5a1776b51bbe6e2add367b7cd577da426ec69
                                                                                        • Instruction Fuzzy Hash: 5001A132D02A11ABD710BB65A805B5E7760AB00764F16813BE811732D1C77CAD62CFDD
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • __lock.LIBCMT ref: 004064DC
                                                                                          • Part of subcall function 00405978: __mtinitlocknum.LIBCMT ref: 0040598E
                                                                                          • Part of subcall function 00405978: __amsg_exit.LIBCMT ref: 0040599A
                                                                                          • Part of subcall function 00405978: EnterCriticalSection.KERNEL32(?,?,?,004084C0,00000004,0040C4E0,0000000C,004065A7,?,?,00000000,00000000,00000000,?,004051D5,00000001), ref: 004059A2
                                                                                        • ___sbh_find_block.LIBCMT ref: 004064E7
                                                                                        • ___sbh_free_block.LIBCMT ref: 004064F6
                                                                                        • HeapFree.KERNEL32(00000000,?,0040C420,0000000C,00405959,00000000,0040C380,0000000C,00405993,?,?,?,004084C0,00000004,0040C4E0,0000000C), ref: 00406526
                                                                                        • GetLastError.KERNEL32(?,004084C0,00000004,0040C4E0,0000000C,004065A7,?,?,00000000,00000000,00000000,?,004051D5,00000001,00000214), ref: 00406537
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                                                        • String ID:
                                                                                        • API String ID: 2714421763-0
                                                                                        • Opcode ID: 1eade601f8cc888ed36a05ed1aa7c80117f494920d3e93a657c1e515239a445f
                                                                                        • Instruction ID: cef7b4fb2fb3a2ce6f8b8a3140fd9300b75d787d530e3f334c06a9082996250d
                                                                                        • Opcode Fuzzy Hash: 1eade601f8cc888ed36a05ed1aa7c80117f494920d3e93a657c1e515239a445f
                                                                                        • Instruction Fuzzy Hash: AF01A271D00615BADB206F72AD06B5F3A64EF01328F11413FF905BA1C5CA3C99508F9D
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 0064618B
                                                                                          • Part of subcall function 006432E2: RtlFreeHeap.NTDLL(00000000,00000000,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?), ref: 006432F8
                                                                                          • Part of subcall function 006432E2: GetLastError.KERNEL32(?,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?,?), ref: 0064330A
                                                                                        • _free.LIBCMT ref: 0064619D
                                                                                        • _free.LIBCMT ref: 006461AF
                                                                                        • _free.LIBCMT ref: 006461C1
                                                                                        • _free.LIBCMT ref: 006461D3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: edab5c0b68d6fa26d2f2d290edcfdb9d5bf2c634644de47bc276ea449411e82d
                                                                                        • Instruction ID: ed34b59f7766596d079b5c62e207365af589925d429704e293c3c6f7a23e52e2
                                                                                        • Opcode Fuzzy Hash: edab5c0b68d6fa26d2f2d290edcfdb9d5bf2c634644de47bc276ea449411e82d
                                                                                        • Instruction Fuzzy Hash: 4AF01232505310AB8B68EB6CF8C7C5A73DFAB05710B645809F44AD7719CB72FF808A69
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: C:\Users\user~1\AppData\Local\Temp\E753.exe
                                                                                        • API String ID: 0-2606265168
                                                                                        • Opcode ID: 48197e99c03ba3794723f49782a54c72518e0806ef29f02f22d2040ed836dd49
                                                                                        • Instruction ID: 2371e3ea835cc26100d03a7c0da51418e3f1075b9ff484268e60c66c75a1735c
                                                                                        • Opcode Fuzzy Hash: 48197e99c03ba3794723f49782a54c72518e0806ef29f02f22d2040ed836dd49
                                                                                        • Instruction Fuzzy Hash: CD414171A00614EBCB21DF99DC8599FBBFAEB85710F10606AE90597311DB718E41CBD4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0064D310,?,?,00000000,00000000,00000000,?), ref: 0064D42F
                                                                                        • CatchIt.LIBVCRUNTIME ref: 0064D515
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CatchEncodePointer
                                                                                        • String ID: MOC$RCC
                                                                                        • API String ID: 1435073870-2084237596
                                                                                        • Opcode ID: 8491f012d202979500a6d12b2c0206e3c6fb7c2bdab481ba65ca31875f684c0a
                                                                                        • Instruction ID: 236ff29e72fc744a689b4c3578688eabeaf9f2c7fe1a239f7354242df38672b0
                                                                                        • Opcode Fuzzy Hash: 8491f012d202979500a6d12b2c0206e3c6fb7c2bdab481ba65ca31875f684c0a
                                                                                        • Instruction Fuzzy Hash: 95414A71D00209AFCF19DF98CC81AEEBBB6FF48304F188199F904A7251D735A951DB55
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0064CEEC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ___except_validate_context_record
                                                                                        • String ID: E_c$csm$csm
                                                                                        • API String ID: 3493665558-1892324558
                                                                                        • Opcode ID: e391a60817169afaa29ceba422a75767582c52c3b219a3c39fb4de3d29f927d8
                                                                                        • Instruction ID: a6299ee61ce5958599a08c1cd479e186de56f0756be6619eb34963613926b57e
                                                                                        • Opcode Fuzzy Hash: e391a60817169afaa29ceba422a75767582c52c3b219a3c39fb4de3d29f927d8
                                                                                        • Instruction Fuzzy Hash: 4331F536502208AFCFE29F50CC048AA7B67FF09335B18819AFD5449321D33ACCA5DB91
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • ___addlocaleref.LIBCMT ref: 004073E8
                                                                                          • Part of subcall function 004072AE: InterlockedIncrement.KERNEL32(?), ref: 004072C0
                                                                                          • Part of subcall function 004072AE: InterlockedIncrement.KERNEL32(?), ref: 004072CD
                                                                                          • Part of subcall function 004072AE: InterlockedIncrement.KERNEL32(?), ref: 004072DA
                                                                                          • Part of subcall function 004072AE: InterlockedIncrement.KERNEL32(?), ref: 004072E7
                                                                                          • Part of subcall function 004072AE: InterlockedIncrement.KERNEL32(?), ref: 004072F4
                                                                                          • Part of subcall function 004072AE: InterlockedIncrement.KERNEL32(?), ref: 00407310
                                                                                          • Part of subcall function 004072AE: InterlockedIncrement.KERNEL32(00000000), ref: 00407320
                                                                                          • Part of subcall function 004072AE: InterlockedIncrement.KERNEL32(?), ref: 00407336
                                                                                        • ___removelocaleref.LIBCMT ref: 004073F3
                                                                                          • Part of subcall function 0040733D: InterlockedDecrement.KERNEL32(00406DA8), ref: 00407357
                                                                                          • Part of subcall function 0040733D: InterlockedDecrement.KERNEL32(A5F32A72), ref: 00407364
                                                                                          • Part of subcall function 0040733D: InterlockedDecrement.KERNEL32(9000406F), ref: 00407371
                                                                                          • Part of subcall function 0040733D: InterlockedDecrement.KERNEL32(749524FF), ref: 0040737E
                                                                                          • Part of subcall function 0040733D: InterlockedDecrement.KERNEL32(83000000), ref: 0040738B
                                                                                          • Part of subcall function 0040733D: InterlockedDecrement.KERNEL32(83000000), ref: 004073A7
                                                                                          • Part of subcall function 0040733D: InterlockedDecrement.KERNEL32(C35D10C4), ref: 004073B7
                                                                                          • Part of subcall function 0040733D: InterlockedDecrement.KERNEL32(848D244B), ref: 004073CD
                                                                                        • ___freetlocinfo.LIBCMT ref: 00407407
                                                                                          • Part of subcall function 00407165: ___free_lconv_mon.LIBCMT ref: 004071AB
                                                                                          • Part of subcall function 00407165: ___free_lconv_num.LIBCMT ref: 004071CC
                                                                                          • Part of subcall function 00407165: ___free_lc_time.LIBCMT ref: 00407251
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663140788.0000000000403000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1662992890.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663098077.0000000000401000.00000040.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663180678.000000000040B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663231232.000000000040D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663352423.0000000000494000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_400000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                                                                                        • String ID: 'I
                                                                                        • API String ID: 467427115-315217059
                                                                                        • Opcode ID: 89ba9a8238ab8529df8984933ea7794b7c43c9145d4eabccec191ffe6770d356
                                                                                        • Instruction ID: 86d1a88e1a570d3005b8f844e527bc306501b56addd1fb2c840ebcfde5f4ce3a
                                                                                        • Opcode Fuzzy Hash: 89ba9a8238ab8529df8984933ea7794b7c43c9145d4eabccec191ffe6770d356
                                                                                        • Instruction Fuzzy Hash: C7E04F22F0A53156CA332669784166B9A940FC1B14B2A407BF844B73C6DB3C6C8688EF
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,0064975D,00000000,00000000,00000000,?,?,?,006495A5,00000000,FlsAlloc,0065506C,00655074), ref: 006496CE
                                                                                        • GetLastError.KERNEL32(?,0064975D,00000000,00000000,00000000,?,?,?,006495A5,00000000,FlsAlloc,0065506C,00655074,00000000,?,00641939), ref: 006496D8
                                                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 00649700
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                        • String ID: api-ms-
                                                                                        • API String ID: 3177248105-2084034818
                                                                                        • Opcode ID: 8eb7eb60687481002b2dec25a40e336cafbf9fced21a7d7295e5ce3bac428e09
                                                                                        • Instruction ID: ce5ac76612b64fa9c4910f1f9ae88dd9c976eefa01627963ed11529d49184091
                                                                                        • Opcode Fuzzy Hash: 8eb7eb60687481002b2dec25a40e336cafbf9fced21a7d7295e5ce3bac428e09
                                                                                        • Instruction Fuzzy Hash: BEE048312D0708BBDF101F60EC06B993F97AB11B52F104020FA0CB55E0DF67A9508695
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _strrchr
                                                                                        • String ID:
                                                                                        • API String ID: 3213747228-0
                                                                                        • Opcode ID: e2428ea8ffb6702ee567ac57b4bf48c757237b5dd35d995b0be89531241a62cb
                                                                                        • Instruction ID: 8acacf6786192b0a94d7457d2b3c54d7300bdc2b67a3c7f51bfed9e1cb678b99
                                                                                        • Opcode Fuzzy Hash: e2428ea8ffb6702ee567ac57b4bf48c757237b5dd35d995b0be89531241a62cb
                                                                                        • Instruction Fuzzy Hash: D8B125729012459FDB15CF68C882BEEBBF7FF55340F2541AAE855AB342DA349D02CB60
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFileLast
                                                                                        • String ID:
                                                                                        • API String ID: 1547350101-0
                                                                                        • Opcode ID: e1e35e444a21a3eacdf5ee695c06dfa5f13dda875bbef9edc9ebbfd4e2125e6c
                                                                                        • Instruction ID: 49dace570fa5220027d3d83ac350fb0566402fa2625e9138a8324a953ce1933d
                                                                                        • Opcode Fuzzy Hash: e1e35e444a21a3eacdf5ee695c06dfa5f13dda875bbef9edc9ebbfd4e2125e6c
                                                                                        • Instruction Fuzzy Hash: B841E2729006059BDB51ABF98C46B9E37ABAF45330F242518FB15E72D2EB70C94087E5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,?,0063D716,?,?,?,?,005E146B,?,?,?,?,?,?), ref: 006423A4
                                                                                        • _free.LIBCMT ref: 00642401
                                                                                        • _free.LIBCMT ref: 00642437
                                                                                        • SetLastError.KERNEL32(00000000,00000007,000000FF,?,0063D716,?,?,?,?,005E146B,?,?,?,?,?,?), ref: 00642442
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast_free
                                                                                        • String ID:
                                                                                        • API String ID: 2283115069-0
                                                                                        • Opcode ID: 5d259fa341f52728f95d75ef9253b487d08be294d4aea600b35e2898677d5fab
                                                                                        • Instruction ID: f83fcc03605d98ff1a76ca30c2e52ed9881c1dcb98e54ebd1efb7ab1bea43a8b
                                                                                        • Opcode Fuzzy Hash: 5d259fa341f52728f95d75ef9253b487d08be294d4aea600b35e2898677d5fab
                                                                                        • Instruction Fuzzy Hash: D81136322047136FC7A17AB59CA2D7A369BDBC27B1F710238F525862D1DF218C860128
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,?,0063C29E,00643AC2), ref: 006424FB
                                                                                        • _free.LIBCMT ref: 00642558
                                                                                        • _free.LIBCMT ref: 0064258E
                                                                                        • SetLastError.KERNEL32(00000000,00000007,000000FF,?,?,?,0063C29E,00643AC2), ref: 00642599
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorLast_free
                                                                                        • String ID:
                                                                                        • API String ID: 2283115069-0
                                                                                        • Opcode ID: 6dc7ad66ebedfa36c6b28063f0ac06531ca589a5d2cd7de6b4440edf2af1c4c5
                                                                                        • Instruction ID: a45905086b2274eb9788d9a308f04832c57333e844b6dd56747e88b4e1b7f25f
                                                                                        • Opcode Fuzzy Hash: 6dc7ad66ebedfa36c6b28063f0ac06531ca589a5d2cd7de6b4440edf2af1c4c5
                                                                                        • Instruction Fuzzy Hash: 491125B22147036FC7957BB89CB6D7B368BABC13B2F750238F125962D1DF218C864224
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WriteConsoleW.KERNEL32(00000010,?,00000000,00000000,00000010,?,0064B483,00000010,00000001,00000010,00000010,?,00645C86,?,00658D38,00000010), ref: 0064D963
                                                                                        • GetLastError.KERNEL32(?,0064B483,00000010,00000001,00000010,00000010,?,00645C86,?,00658D38,00000010,?,00000010,?,0064571A,0063D33D), ref: 0064D96F
                                                                                          • Part of subcall function 0064D9C0: CloseHandle.KERNEL32(FFFFFFFE,0064D97F,?,0064B483,00000010,00000001,00000010,00000010,?,00645C86,?,00658D38,00000010,?,00000010), ref: 0064D9D0
                                                                                        • ___initconout.LIBCMT ref: 0064D97F
                                                                                          • Part of subcall function 0064D9A1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0064D93D,0064B470,00000010,?,00645C86,?,00658D38,00000010,?), ref: 0064D9B4
                                                                                        • WriteConsoleW.KERNEL32(00000010,?,00000000,00000000,?,0064B483,00000010,00000001,00000010,00000010,?,00645C86,?,00658D38,00000010,?), ref: 0064D994
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                        • String ID:
                                                                                        • API String ID: 2744216297-0
                                                                                        • Opcode ID: f3d84c3cbd5d4bebc8b75765fe6bb5151d42ef5891ef93acae10ae5a5451a09a
                                                                                        • Instruction ID: c658fa0ff1a713e72b4ca05d556d93bccd649aa68250c697410ac94c9817714c
                                                                                        • Opcode Fuzzy Hash: f3d84c3cbd5d4bebc8b75765fe6bb5151d42ef5891ef93acae10ae5a5451a09a
                                                                                        • Instruction Fuzzy Hash: 6AF03036900655BFCF626F95EC04ADD3F67FB083A2F005011FA08D6230EA328A209BD4
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _free.LIBCMT ref: 00638DF0
                                                                                          • Part of subcall function 006432E2: RtlFreeHeap.NTDLL(00000000,00000000,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?), ref: 006432F8
                                                                                          • Part of subcall function 006432E2: GetLastError.KERNEL32(?,?,006462EA,?,00000000,?,?,?,006461F5,?,00000007,?,?,0064693B,?,?), ref: 0064330A
                                                                                        • _free.LIBCMT ref: 00638E03
                                                                                        • _free.LIBCMT ref: 00638E14
                                                                                        • _free.LIBCMT ref: 00638E25
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 776569668-0
                                                                                        • Opcode ID: 2d9a661e3ad1d1d1e76eba9cb4a43710e4ed77701ff4d52e38f26dd3aee7be81
                                                                                        • Instruction ID: f888550ad8b512e65f3e2853ef7ddaa8f1a2ef58bf152890b385b2cc8cb258f5
                                                                                        • Opcode Fuzzy Hash: 2d9a661e3ad1d1d1e76eba9cb4a43710e4ed77701ff4d52e38f26dd3aee7be81
                                                                                        • Instruction Fuzzy Hash: 71E09AB6400720DB8751BF74EC534473A27E744712F51A12AF41152335C7B607519F89
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0064DE3F), ref: 0064E4EC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: DecodePointer
                                                                                        • String ID: (te$E_c
                                                                                        • API String ID: 3527080286-281418068
                                                                                        • Opcode ID: d3b3a55bef7fd5629c0db82382b7d38580094bf792cff17c0544ff961f308655
                                                                                        • Instruction ID: 8f6456ac890199854bb3cfdb9e6c25ff97e888f3db4cd79db9d58dc28d0ec07b
                                                                                        • Opcode Fuzzy Hash: d3b3a55bef7fd5629c0db82382b7d38580094bf792cff17c0544ff961f308655
                                                                                        • Instruction Fuzzy Hash: 9151AC7090460ACBCF149FA8E94C1FDBFB6FB15309F520195E881AB264CB76892ACB50
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: _free
                                                                                        • String ID: pe
                                                                                        • API String ID: 269201875-324909747
                                                                                        • Opcode ID: 4825ba56f2a742b0bab4ea7769e1a30268bdf4a3f3bfc8bd28776caffe1decf5
                                                                                        • Instruction ID: d8fcd074b9a105cc76177cb3ba549000e85dac2d40e3c624769e0d7abc744ee3
                                                                                        • Opcode Fuzzy Hash: 4825ba56f2a742b0bab4ea7769e1a30268bdf4a3f3bfc8bd28776caffe1decf5
                                                                                        • Instruction Fuzzy Hash: 2F110871A1072087EB64EF38AC06B55379BAB51735F14162AF561DB3D0F3B4DB424B81
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • lstrcatW.KERNEL32(00000000,?), ref: 005E2898
                                                                                        • lstrcatW.KERNEL32(00000000,\Last Version), ref: 005E28A0
                                                                                          • Part of subcall function 0063D6C5: _free.LIBCMT ref: 0063D6D8
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: lstrcat$_free
                                                                                        • String ID: \Last Version
                                                                                        • API String ID: 1597172325-2633859252
                                                                                        • Opcode ID: 16f5b96e72e3407cef46d296ba3461d00215b13ca7bec87eb026372e578b285f
                                                                                        • Instruction ID: 6ef8bd29e35fb10b1ec3ea2cd5c99f8ec05597392521110ef84dd4476e5652c8
                                                                                        • Opcode Fuzzy Hash: 16f5b96e72e3407cef46d296ba3461d00215b13ca7bec87eb026372e578b285f
                                                                                        • Instruction Fuzzy Hash: ECF090B26042046FD200AB65EC46D5B7BEDEFCA304F000428FA4897341E676AA158BA3
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • lstrcatW.KERNEL32 ref: 0062F7CE
                                                                                        • lstrcatW.KERNEL32 ref: 0062F7F8
                                                                                          • Part of subcall function 0063D6C5: _free.LIBCMT ref: 0063D6D8
                                                                                        Strings
                                                                                        • ec48478eb02322f7d86623ec, xrefs: 0062F7D7
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: lstrcat$_free
                                                                                        • String ID: ec48478eb02322f7d86623ec
                                                                                        • API String ID: 1597172325-1363470560
                                                                                        • Opcode ID: 491f860f99cd5dad7abbf87baeb15a01350f10569d8093b5f33afe775cef589d
                                                                                        • Instruction ID: 8ea3897036a6ba002ac6fcd414e6f3365ebdaecab2793463500ab9411a1963a2
                                                                                        • Opcode Fuzzy Hash: 491f860f99cd5dad7abbf87baeb15a01350f10569d8093b5f33afe775cef589d
                                                                                        • Instruction Fuzzy Hash: AB115BB49087019FD700EF68D58966EBBF1AB84314F408C2DE8D887351D7B899898B86
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 00642013
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CountCriticalInitializeSectionSpin
                                                                                        • String ID: E_c$InitializeCriticalSectionEx
                                                                                        • API String ID: 2593887523-780490233
                                                                                        • Opcode ID: 8ab2328266598b2c9e8da6a24a6ff28050c584d9c1b75479f8698fc0627259b2
                                                                                        • Instruction ID: 0db20f18cdcbae44ec6daea105dbe707bc6f05154e52d212d1794eb8e0d944ae
                                                                                        • Opcode Fuzzy Hash: 8ab2328266598b2c9e8da6a24a6ff28050c584d9c1b75479f8698fc0627259b2
                                                                                        • Instruction Fuzzy Hash: 5BE09231580619B7CF211F51EC06DED7F17EB14B66F414050FD1856260CEB249B1EBD0
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000012.00000002.1663645980.00000000005E1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: true
                                                                                        • Associated: 00000012.00000002.1663580026.00000000005E0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663729318.0000000000650000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663761063.000000000065A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000012.00000002.1663807606.0000000000660000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_18_2_5e0000_E753.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: Alloc
                                                                                        • String ID: E_c$FlsAlloc
                                                                                        • API String ID: 2773662609-2428280233
                                                                                        • Opcode ID: 977e57f65cb57a72d4144558bf0e6f634d59caa4b5efe8ed81c58892cf1b8144
                                                                                        • Instruction ID: befb2e39fcf6082c4075d86f6aa8c39ae1b763d34c3961904d16cc7c2ac12909
                                                                                        • Opcode Fuzzy Hash: 977e57f65cb57a72d4144558bf0e6f634d59caa4b5efe8ed81c58892cf1b8144
                                                                                        • Instruction Fuzzy Hash: 7AE0C232A8472477832132905C0B9AE7E5B8B62B67F010291FE0427292AEA08DD785D5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 85 401459-4014b5 call 401101 97 4014b7 85->97 98 4014ba-4014bf 85->98 97->98 100 4017e4-4017ec 98->100 101 4014c5-4014d6 98->101 100->98 104 4017e2-401833 call 401101 101->104 105 4014dc-401505 101->105 105->104 113 40150b-401522 NtDuplicateObject 105->113 113->104 115 401528-40154c NtCreateSection 113->115 117 4015a8-4015ce NtCreateSection 115->117 118 40154e-40156f NtMapViewOfSection 115->118 117->104 121 4015d4-4015d8 117->121 118->117 119 401571-40158d NtMapViewOfSection 118->119 119->117 122 40158f-4015a5 119->122 121->104 123 4015de-4015ff NtMapViewOfSection 121->123 122->117 123->104 126 401605-401621 NtMapViewOfSection 123->126 126->104 129 401627 call 40162c 126->129 129->104
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040156A
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401588
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004015C9
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015FA
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040161C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 34be86138d5534148519a24711ed8635c2048893eca697abca49757e8b207f9d
                                                                                        • Instruction ID: 824bdb3f01dfe795a3c7e8dad3f72d12e996fe891ee9aa3045e2d2799232a241
                                                                                        • Opcode Fuzzy Hash: 34be86138d5534148519a24711ed8635c2048893eca697abca49757e8b207f9d
                                                                                        • Instruction Fuzzy Hash: 03615075900244FBEB209F91CC88FAF7BBCEF85710F20412AF912BA1E5D6749902DB25
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 132 401464-4014b5 call 401101 142 4014b7 132->142 143 4014ba-4014bf 132->143 142->143 145 4017e4-4017ec 143->145 146 4014c5-4014d6 143->146 145->143 149 4017e2-401833 call 401101 146->149 150 4014dc-401505 146->150 150->149 158 40150b-401522 NtDuplicateObject 150->158 158->149 160 401528-40154c NtCreateSection 158->160 162 4015a8-4015ce NtCreateSection 160->162 163 40154e-40156f NtMapViewOfSection 160->163 162->149 166 4015d4-4015d8 162->166 163->162 164 401571-40158d NtMapViewOfSection 163->164 164->162 167 40158f-4015a5 164->167 166->149 168 4015de-4015ff NtMapViewOfSection 166->168 167->162 168->149 171 401605-401621 NtMapViewOfSection 168->171 171->149 174 401627 call 40162c 171->174 174->149
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040156A
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401588
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004015C9
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015FA
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040161C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 05bab2e241f9b84ab4efb0cca492a1c95c42257ec5087267486ceeedc174d58f
                                                                                        • Instruction ID: 1b7a740d0a2c2f6fa3111a7952f10ef420ed90631ee8fafdee6261f7546e4b5c
                                                                                        • Opcode Fuzzy Hash: 05bab2e241f9b84ab4efb0cca492a1c95c42257ec5087267486ceeedc174d58f
                                                                                        • Instruction Fuzzy Hash: 5C512EB5900245BFEB208F91CC89FAFBBB8FF85700F144169F911BA1E5D6749945CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 177 401476-4014b5 call 401101 185 4014b7 177->185 186 4014ba-4014bf 177->186 185->186 188 4017e4-4017ec 186->188 189 4014c5-4014d6 186->189 188->186 192 4017e2-401833 call 401101 189->192 193 4014dc-401505 189->193 193->192 201 40150b-401522 NtDuplicateObject 193->201 201->192 203 401528-40154c NtCreateSection 201->203 205 4015a8-4015ce NtCreateSection 203->205 206 40154e-40156f NtMapViewOfSection 203->206 205->192 209 4015d4-4015d8 205->209 206->205 207 401571-40158d NtMapViewOfSection 206->207 207->205 210 40158f-4015a5 207->210 209->192 211 4015de-4015ff NtMapViewOfSection 209->211 210->205 211->192 214 401605-401621 NtMapViewOfSection 211->214 214->192 217 401627 call 40162c 214->217 217->192
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040156A
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401588
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004015C9
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015FA
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040161C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 5c8bbe3789b200221ace6d9736778ac41257909709fd0dd0604ec1e6d710d098
                                                                                        • Instruction ID: 24926f0ed9362c88baa72b1d3950bb37aab3afc39f97412acee1af3b4ee373b4
                                                                                        • Opcode Fuzzy Hash: 5c8bbe3789b200221ace6d9736778ac41257909709fd0dd0604ec1e6d710d098
                                                                                        • Instruction Fuzzy Hash: 62511B74900205BFEB208F91CC88FAFBBB8FF85B10F104169F911BA2A5D6759945CB64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 220 401487-4014b5 call 401101 229 4014b7 220->229 230 4014ba-4014bf 220->230 229->230 232 4017e4-4017ec 230->232 233 4014c5-4014d6 230->233 232->230 236 4017e2-401833 call 401101 233->236 237 4014dc-401505 233->237 237->236 245 40150b-401522 NtDuplicateObject 237->245 245->236 247 401528-40154c NtCreateSection 245->247 249 4015a8-4015ce NtCreateSection 247->249 250 40154e-40156f NtMapViewOfSection 247->250 249->236 253 4015d4-4015d8 249->253 250->249 251 401571-40158d NtMapViewOfSection 250->251 251->249 254 40158f-4015a5 251->254 253->236 255 4015de-4015ff NtMapViewOfSection 253->255 254->249 255->236 258 401605-401621 NtMapViewOfSection 255->258 258->236 261 401627 call 40162c 258->261 261->236
                                                                                        APIs
                                                                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 0040156A
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401588
                                                                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004015C9
                                                                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004015FA
                                                                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 0040161C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: Section$View$Create$DuplicateObject
                                                                                        • String ID:
                                                                                        • API String ID: 1546783058-0
                                                                                        • Opcode ID: 6eb8a07e00e2e755f482ca8ed8370cad2c8179b47025c7194bcdd19921fca50a
                                                                                        • Instruction ID: 531b993744403f3b0e459290f0a2e4e38646215b0f3fea317dafb4ce5b717631
                                                                                        • Opcode Fuzzy Hash: 6eb8a07e00e2e755f482ca8ed8370cad2c8179b47025c7194bcdd19921fca50a
                                                                                        • Instruction Fuzzy Hash: 7B51FA74900245BFEB208F91CC89FAFBBB8FF85B10F104169F911BA2E5D6759945CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 0 99003c-990047 1 990049 0->1 2 99004c-990263 call 990a3f call 990e0f call 990d90 VirtualAlloc 0->2 1->2 17 99028b-990292 2->17 18 990265-990289 call 990a69 2->18 19 9902a1-9902b0 17->19 21 9902ce-9903c2 VirtualProtect call 990cce call 990ce7 18->21 19->21 22 9902b2-9902cc 19->22 29 9903d1-9903e0 21->29 22->19 30 990439-9904b8 VirtualFree 29->30 31 9903e2-990437 call 990ce7 29->31 33 9904be-9904cd 30->33 34 9905f4-9905fe 30->34 31->29 35 9904d3-9904dd 33->35 36 99077f-990789 34->36 37 990604-99060d 34->37 35->34 39 9904e3-990505 35->39 40 99078b-9907a3 36->40 41 9907a6-9907b0 36->41 37->36 42 990613-990637 37->42 51 990517-990520 39->51 52 990507-990515 39->52 40->41 44 99086e-9908be LoadLibraryA 41->44 45 9907b6-9907cb 41->45 46 99063e-990648 42->46 50 9908c7-9908f9 44->50 48 9907d2-9907d5 45->48 46->36 49 99064e-99065a 46->49 53 990824-990833 48->53 54 9907d7-9907e0 48->54 49->36 55 990660-99066a 49->55 56 9908fb-990901 50->56 57 990902-99091d 50->57 58 990526-990547 51->58 52->58 62 990839-99083c 53->62 59 9907e2 54->59 60 9907e4-990822 54->60 61 99067a-990689 55->61 56->57 63 99054d-990550 58->63 59->53 60->48 64 99068f-9906b2 61->64 65 990750-99077a 61->65 62->44 66 99083e-990847 62->66 68 9905e0-9905ef 63->68 69 990556-99056b 63->69 70 9906ef-9906fc 64->70 71 9906b4-9906ed 64->71 65->46 72 990849 66->72 73 99084b-99086c 66->73 68->35 74 99056d 69->74 75 99056f-99057a 69->75 76 99074b 70->76 77 9906fe-990748 70->77 71->70 72->44 73->62 74->68 79 99059b-9905bb 75->79 80 99057c-990599 75->80 76->61 77->76 84 9905bd-9905db 79->84 80->84 84->63
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0099024D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709564637.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_990000_F280.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID: cess$kernel32.dll
                                                                                        • API String ID: 4275171209-1230238691
                                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                        • Instruction ID: cd4b7741529196e3b900c45689e90016cd92319ae4b5bb5a884e835b5848cf64
                                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                        • Instruction Fuzzy Hash: F5527874A01229DFDB64CF98C984BACBBB5BF49304F1480D9E95DAB251DB30AE84DF14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 264 b1f69a-b1f6b3 265 b1f6b5-b1f6b7 264->265 266 b1f6b9 265->266 267 b1f6be-b1f6ca CreateToolhelp32Snapshot 265->267 266->267 268 b1f6da-b1f6e7 Module32First 267->268 269 b1f6cc-b1f6d2 267->269 270 b1f6f0-b1f6f8 268->270 271 b1f6e9-b1f6ea call b1f359 268->271 269->268 276 b1f6d4-b1f6d8 269->276 274 b1f6ef 271->274 274->270 276->265 276->268
                                                                                        APIs
                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00B1F6C2
                                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 00B1F6E2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709868553.0000000000B18000.00000040.00000020.00020000.00000000.sdmp, Offset: 00B18000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_b18000_F280.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                        • String ID:
                                                                                        • API String ID: 3833638111-0
                                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction ID: 61a8e6487562b77cf520ac16fce65de2fa25cdc8875ebebf389838c08913ed05
                                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction Fuzzy Hash: 73F062322007166BD7202BF5A88DBBE76E8EF49764F5005B8E656D10D0DB70EC85CA65
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 277 990e0f-990e24 SetErrorMode * 2 278 990e2b-990e2c 277->278 279 990e26 277->279 279->278
                                                                                        APIs
                                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,00990223,?,?), ref: 00990E19
                                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,00990223,?,?), ref: 00990E1E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709564637.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_990000_F280.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: ErrorMode
                                                                                        • String ID:
                                                                                        • API String ID: 2340568224-0
                                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                        • Instruction ID: 47455b4d9e8784be7886e97fbbdae7242364080e5199662cd228575d61da8e96
                                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                        • Instruction Fuzzy Hash: 63D0123514512877DB002AD8DC09BCD7B1CDF05B62F008411FB0DD9080C770994046E5
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 294 401836-40183f 295 401855 294->295 296 401846-401851 294->296 295->296 297 401858-4018a3 call 401101 Sleep call 401362 295->297 296->297 308 4018b2-4018fc call 401101 297->308 309 4018a5-4018ad call 401459 297->309 309->308
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388,000000F2), ref: 0040188E
                                                                                          • Part of subcall function 00401459: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                          • Part of subcall function 00401459: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                                                        • String ID:
                                                                                        • API String ID: 4152845823-0
                                                                                        • Opcode ID: 5fe9852cb3b16d13d41dc0a5a5dd34054b66a166a86d7432244ea44f75af5684
                                                                                        • Instruction ID: 26a1fdf4500ec8cbc3ac7de6d99b3c29e4db1c45972af98faf71547af7c19dd8
                                                                                        • Opcode Fuzzy Hash: 5fe9852cb3b16d13d41dc0a5a5dd34054b66a166a86d7432244ea44f75af5684
                                                                                        • Instruction Fuzzy Hash: 4D115A33608204EBE7007A958D81A6A3359AB01744F30C53BBA03791F1E57D9B17776B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 323 401841-4018a3 call 401101 Sleep call 401362 336 4018b2-4018fc call 401101 323->336 337 4018a5-4018ad call 401459 323->337 337->336
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388,000000F2), ref: 0040188E
                                                                                          • Part of subcall function 00401459: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                          • Part of subcall function 00401459: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                                                        • String ID:
                                                                                        • API String ID: 4152845823-0
                                                                                        • Opcode ID: 8ee1de9066595ad0e61d64b713a9fac7be815ebb721b5af3ac785391454956b3
                                                                                        • Instruction ID: 60792c4a7526ea552847b3a91dff35a52e5e302759975406a596f99de029ab3f
                                                                                        • Opcode Fuzzy Hash: 8ee1de9066595ad0e61d64b713a9fac7be815ebb721b5af3ac785391454956b3
                                                                                        • Instruction Fuzzy Hash: 61013933608204EBE7007A959D41ABA3355AB01700F30C53BBA13BA1E2D67D9B16775B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 351 401853-401855 353 401846-401851 351->353 354 401858-4018a3 call 401101 Sleep call 401362 351->354 353->354 365 4018b2-4018fc call 401101 354->365 366 4018a5-4018ad call 401459 354->366 366->365
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388,000000F2), ref: 0040188E
                                                                                          • Part of subcall function 00401459: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                          • Part of subcall function 00401459: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                                                        • String ID:
                                                                                        • API String ID: 4152845823-0
                                                                                        • Opcode ID: 54946a7250cb5feca53fdd6599a6a1ac6599185f95ef7f8e449090f0b593b209
                                                                                        • Instruction ID: 03e687555a80bda43a0fb2ee47453ef0aaeecb99a45078ea764f23224eae553e
                                                                                        • Opcode Fuzzy Hash: 54946a7250cb5feca53fdd6599a6a1ac6599185f95ef7f8e449090f0b593b209
                                                                                        • Instruction Fuzzy Hash: 4D015B33608244EBE700BA958D81A6A3355AB45340F30C537BA53791F2D57D9B13776B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 380 401857-4018a3 call 401101 Sleep call 401362 392 4018b2-4018fc call 401101 380->392 393 4018a5-4018ad call 401459 380->393 393->392
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388,000000F2), ref: 0040188E
                                                                                          • Part of subcall function 00401459: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                          • Part of subcall function 00401459: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                                                        • String ID:
                                                                                        • API String ID: 4152845823-0
                                                                                        • Opcode ID: 60d69e591f8ae860f05d4a1728b49aadf6fc8823851b109aae25b7397b01a375
                                                                                        • Instruction ID: 9a71c24e7624d4cba15f7dc810b31ffa0f6b825e5129f2c2b066e818f6866dfb
                                                                                        • Opcode Fuzzy Hash: 60d69e591f8ae860f05d4a1728b49aadf6fc8823851b109aae25b7397b01a375
                                                                                        • Instruction Fuzzy Hash: 84015A33608204EBEB007AA58981A7A3355AB05344F30C537BA13791F2D67DDB13776B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 407 40185b-4018a3 call 401101 Sleep call 401362 416 4018b2-4018fc call 401101 407->416 417 4018a5-4018ad call 401459 407->417 417->416
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388,000000F2), ref: 0040188E
                                                                                          • Part of subcall function 00401459: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                          • Part of subcall function 00401459: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                                                        • String ID:
                                                                                        • API String ID: 4152845823-0
                                                                                        • Opcode ID: 4388562ce27fc4a15a78ad1b772eee4a6aa3e4e486251ae2e078266ee9ffae5a
                                                                                        • Instruction ID: 819a87e902f8c0d7a2d51235ddf7de8326c9ac12c4bfa64292614a1114275343
                                                                                        • Opcode Fuzzy Hash: 4388562ce27fc4a15a78ad1b772eee4a6aa3e4e486251ae2e078266ee9ffae5a
                                                                                        • Instruction Fuzzy Hash: F6015A33608244EBDB017AA59C81A6A3765AB05344F20C537BA53790F2C67DDB13B76B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 431 40187c-40187d 432 40186a-40187b 431->432 433 40187f-4018a3 call 401101 Sleep call 401362 431->433 432->431 439 4018b2-4018fc call 401101 433->439 440 4018a5-4018ad call 401459 433->440 440->439
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388,000000F2), ref: 0040188E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: Sleep
                                                                                        • String ID:
                                                                                        • API String ID: 3472027048-0
                                                                                        • Opcode ID: 22e121ca1fce9ea374c1d2197991afafad4e058241d826c977f5527675b6c88e
                                                                                        • Instruction ID: 25ca90d843f9a0050b2ac0440a8a7fc97a2c355cc6a88e856e0782c626425077
                                                                                        • Opcode Fuzzy Hash: 22e121ca1fce9ea374c1d2197991afafad4e058241d826c977f5527675b6c88e
                                                                                        • Instruction Fuzzy Hash: CC018433608245EBDB01BBA18C81D6A3765BB05344F20C577BA12BA0F3D63D9B12B75B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 454 401865-401868 455 40187e 454->455 456 40186f-4018a3 call 401101 Sleep call 401362 454->456 455->456 462 4018b2-4018fc call 401101 456->462 463 4018a5-4018ad call 401459 456->463 463->462
                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388,000000F2), ref: 0040188E
                                                                                          • Part of subcall function 00401459: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                          • Part of subcall function 00401459: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                                                        • String ID:
                                                                                        • API String ID: 4152845823-0
                                                                                        • Opcode ID: 1f4d1c7c02ee77c938f54659cb8056c4a616808132e58342662b8049ff76b57c
                                                                                        • Instruction ID: 4d6adbc00aad04e5ca27aa77f6ef62765a3aff560696b363dc11b175c0b3fa60
                                                                                        • Opcode Fuzzy Hash: 1f4d1c7c02ee77c938f54659cb8056c4a616808132e58342662b8049ff76b57c
                                                                                        • Instruction Fuzzy Hash: 1A017C33608204EADB007A958C81A6A3355AB04340F20C437BA13790F2C67DDB12B76B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00B1F3AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709868553.0000000000B18000.00000040.00000020.00020000.00000000.sdmp, Offset: 00B18000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_b18000_F280.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction ID: 51e6e2ec8147a1334cbe2ea3bbda9d7787d10c463362e5a1d721a08f124233e7
                                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction Fuzzy Hash: 6F113C79A00208EFDB01DF98C985E98BBF5EF08351F0580A4F9489B362D371EA90DF80
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00001388,000000F2), ref: 0040188E
                                                                                          • Part of subcall function 00401459: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 0040151A
                                                                                          • Part of subcall function 00401459: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401547
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000014.00000002.1709031022.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_20_2_400000_F280.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateDuplicateObjectSectionSleep
                                                                                        • String ID:
                                                                                        • API String ID: 4152845823-0
                                                                                        • Opcode ID: 17e01e687d2cfe3c0bd93bcd5c385f2b95dcf6ed0bed1ba72d578ddb48059264
                                                                                        • Instruction ID: 11d8220debcba0805b8e93cbae1e229f3b2aa4fb6d79ffb341e5739e87d873ed
                                                                                        • Opcode Fuzzy Hash: 17e01e687d2cfe3c0bd93bcd5c385f2b95dcf6ed0bed1ba72d578ddb48059264
                                                                                        • Instruction Fuzzy Hash: 38016233608204EBEB007A958C41E6A3355BB44354F20C537BA13791F2C67D9B12776B
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 05800156
                                                                                        • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 0580016C
                                                                                        • CreateProcessA.KERNELBASE(?,00000000), ref: 05800255
                                                                                        • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 05800270
                                                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 05800283
                                                                                        • Wow64GetThreadContext.KERNEL32(00000000,?), ref: 0580029F
                                                                                        • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 058002C8
                                                                                        • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 058002E3
                                                                                        • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 05800304
                                                                                        • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 0580032A
                                                                                        • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 05800399
                                                                                        • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 058003BF
                                                                                        • Wow64SetThreadContext.KERNEL32(00000000,?), ref: 058003E1
                                                                                        • ResumeThread.KERNELBASE(00000000), ref: 058003ED
                                                                                        • ExitProcess.KERNEL32(00000000), ref: 05800412
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000015.00000002.1684035456.0000000005800000.00000040.00001000.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_21_2_5800000_csrss.jbxd
                                                                                        Similarity
                                                                                        • API ID: Virtual$MemoryProcess$AllocThreadWrite$ContextWow64$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                                                                                        • String ID:
                                                                                        • API String ID: 93872480-0
                                                                                        • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                                                                        • Instruction ID: 8a60b455a91f4c46fa0693e9c4a5393146f970e159f98c68e215caacc4d980b1
                                                                                        • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                                                                        • Instruction Fuzzy Hash: 15B1B774A00208EFDB44CF98C895F9EBBB5BF88314F248158E909AB391D771AD41CF94
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 15 5800420-58004f8 17 58004fa 15->17 18 58004ff-580053c CreateWindowExA 15->18 19 58005aa-58005ad 17->19 20 5800540-5800558 PostMessageA 18->20 21 580053e 18->21 22 580055f-5800563 20->22 21->19 22->19 23 5800565-5800579 22->23 23->19 25 580057b-5800582 23->25 26 5800584-5800588 25->26 27 58005a8 25->27 26->27 28 580058a-5800591 26->28 27->22 28->27 29 5800593-5800597 call 5800110 28->29 31 580059c-58005a5 29->31 31->27
                                                                                        APIs
                                                                                        • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 05800533
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000015.00000002.1684035456.0000000005800000.00000040.00001000.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_21_2_5800000_csrss.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                                                                                        • API String ID: 716092398-2341455598
                                                                                        • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                                                                        • Instruction ID: aa4c95fec092a579510b0ade49de024acb92613a7e569f57207463b4185843a5
                                                                                        • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                                                                        • Instruction Fuzzy Hash: B3510970D08388DAEB11CB98C849BEDBFB26F15708F144058D5447F2C6C7BA5A58CB66
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 32 58005b0-58005d5 33 58005dc-58005e0 32->33 34 58005e2-58005f5 GetFileAttributesA 33->34 35 580061e-5800621 33->35 36 5800613-580061c 34->36 37 58005f7-58005fe 34->37 36->33 37->36 38 5800600-580060b call 5800420 37->38 40 5800610 38->40 40->36
                                                                                        APIs
                                                                                        • GetFileAttributesA.KERNELBASE(apfHQ), ref: 058005EC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000015.00000002.1684035456.0000000005800000.00000040.00001000.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_21_2_5800000_csrss.jbxd
                                                                                        Similarity
                                                                                        • API ID: AttributesFile
                                                                                        • String ID: apfHQ$o
                                                                                        • API String ID: 3188754299-2999369273
                                                                                        • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                                                                        • Instruction ID: c83a06060244a98ba9edee13f350b2377d06d760f1cdfd0e5406cfa0f83457b4
                                                                                        • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                                                                        • Instruction Fuzzy Hash: 82011E70C0424CEEDB50DBD8C9183EEBFB5AF41309F588099C8196B281D7769B58CBA2
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 41 56007a6-56007bf 42 56007c1-56007c3 41->42 43 56007c5 42->43 44 56007ca-56007d6 CreateToolhelp32Snapshot 42->44 43->44 45 56007e6-56007f3 Module32First 44->45 46 56007d8-56007de 44->46 47 56007f5-56007f6 call 5600465 45->47 48 56007fc-5600804 45->48 46->45 52 56007e0-56007e4 46->52 53 56007fb 47->53 52->42 52->45 53->48
                                                                                        APIs
                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 056007CE
                                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 056007EE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000015.00000002.1682638655.0000000005600000.00000040.00000020.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_21_2_5600000_csrss.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                        • String ID:
                                                                                        • API String ID: 3833638111-0
                                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction ID: 86ea407bdaab867d31bc701ea9c73e5380a54dda236d7e962285f9d2833f5d8f
                                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                        • Instruction Fuzzy Hash: 53F0C2312007146BD7243AB5988CFBF76E8BF49635F501528E643915C0DA74E8058A61
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 54 5600465-560049f call 5600778 57 56004a1-56004d4 VirtualAlloc call 56004f2 54->57 58 56004ed 54->58 60 56004d9-56004eb 57->60 58->58 60->58
                                                                                        APIs
                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 056004B6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000015.00000002.1682638655.0000000005600000.00000040.00000020.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_21_2_5600000_csrss.jbxd
                                                                                        Yara matches
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction ID: c7c2663241e8c20459fb51ad6ec7573cb040ca6b8dface616a5ec1639f597e4a
                                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                        • Instruction Fuzzy Hash: 27113C79A40208EFDB01DF98C989E99BBF5EF08350F058094F9489B361D775EA50DF84
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _errno
                                                                                        • String ID: PATH$TCL$UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s$VALUE$WTF$ntation$unable to alloc %u bytes
                                                                                        • API String ID: 2918714741-3483878451
                                                                                        • Opcode ID: 65b834722591142376089ff792cce9476ee0e4298f3b73225e0299b18580a598
                                                                                        • Instruction ID: 05482507078be5c82356724d3b93f2107f97ab83b210b37a145a8ea25eee124a
                                                                                        • Opcode Fuzzy Hash: 65b834722591142376089ff792cce9476ee0e4298f3b73225e0299b18580a598
                                                                                        • Instruction Fuzzy Hash: 0752CFE1E0C28285FB658F35D154B7967A2AF55B80F18D036CA6F87AE1DF2CE895C700
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 674 7ffb0bfaa8c0-7ffb0bfaa925 675 7ffb0bfaa927-7ffb0bfaa92c call 7ffb0bfaa620 674->675 676 7ffb0bfaa92f-7ffb0bfaa943 674->676 675->676 678 7ffb0bfaa945-7ffb0bfaa949 676->678 679 7ffb0bfaa94b-7ffb0bfaa95b memchr 676->679 678->679 681 7ffb0bfaa960-7ffb0bfaa96e 678->681 679->681 682 7ffb0bfaa974-7ffb0bfaa97a 681->682 683 7ffb0bfaad80 681->683 685 7ffb0bfaa97c-7ffb0bfaa97e 682->685 686 7ffb0bfaa980-7ffb0bfaa987 682->686 684 7ffb0bfaad82-7ffb0bfaadac call 7ffb0c046240 683->684 685->686 688 7ffb0bfaa989-7ffb0bfaa9a2 call 7ffb0c005db0 686->688 689 7ffb0bfaa9d8-7ffb0bfaa9db 686->689 700 7ffb0bfaa9a4-7ffb0bfaa9a7 688->700 701 7ffb0bfaa9ad-7ffb0bfaa9d4 688->701 690 7ffb0bfaa9dd-7ffb0bfaa9fc memmove 689->690 691 7ffb0bfaa9ff-7ffb0bfaaa03 689->691 690->691 694 7ffb0bfaaa09-7ffb0bfaaa48 691->694 695 7ffb0bfaadca-7ffb0bfaae19 call 7ffb0bfe7370 call 7ffb0c006220 call 7ffb0bfaaec0 691->695 697 7ffb0bfaaa4a-7ffb0bfaaa4c 694->697 698 7ffb0bfaaa4e-7ffb0bfaaa50 694->698 716 7ffb0bfaae1e-7ffb0bfaae22 695->716 702 7ffb0bfaaa69-7ffb0bfaaad4 697->702 698->702 703 7ffb0bfaaa52-7ffb0bfaaa59 698->703 700->701 705 7ffb0bfaadad-7ffb0bfaadbc call 7ffb0bfe7370 700->705 701->689 713 7ffb0bfaaad6-7ffb0bfaaadb 702->713 714 7ffb0bfaaae1-7ffb0bfaaaf5 702->714 707 7ffb0bfaaa60-7ffb0bfaaa67 703->707 712 7ffb0bfaadbd-7ffb0bfaadc9 call 7ffb0bfe7370 705->712 707->702 707->707 712->695 713->714 718 7ffb0bfaab03-7ffb0bfaab2f 714->718 719 7ffb0bfaaaf7-7ffb0bfaaafd 714->719 720 7ffb0bfaae45-7ffb0bfaae4f 716->720 721 7ffb0bfaae24-7ffb0bfaae2b 716->721 724 7ffb0bfaab35-7ffb0bfaab38 718->724 725 7ffb0bfaac4f-7ffb0bfaac56 718->725 719->718 723 7ffb0bfaad0d-7ffb0bfaad10 719->723 729 7ffb0bfaaea1-7ffb0bfaaeb2 720->729 730 7ffb0bfaae51-7ffb0bfaae58 720->730 727 7ffb0bfaae39-7ffb0bfaae40 call 7ffb0c011b00 721->727 728 7ffb0bfaae2d-7ffb0bfaae35 call 7ffb0bfe3710 721->728 733 7ffb0bfaad1a-7ffb0bfaad20 723->733 734 7ffb0bfaad12-7ffb0bfaad15 call 7ffb0c005f00 723->734 724->725 726 7ffb0bfaab3e-7ffb0bfaab44 724->726 731 7ffb0bfaac58-7ffb0bfaac78 memmove 725->731 732 7ffb0bfaac7b-7ffb0bfaac87 725->732 736 7ffb0bfaab46-7ffb0bfaab49 726->736 737 7ffb0bfaab69 726->737 727->720 728->727 742 7ffb0bfaae5a-7ffb0bfaae5f 730->742 743 7ffb0bfaae7b-7ffb0bfaae82 730->743 731->732 744 7ffb0bfaac89-7ffb0bfaac97 732->744 745 7ffb0bfaac9c-7ffb0bfaac9f 732->745 738 7ffb0bfaad4b-7ffb0bfaad4f 733->738 739 7ffb0bfaad22-7ffb0bfaad31 _errno 733->739 734->733 748 7ffb0bfaab5a-7ffb0bfaab67 736->748 749 7ffb0bfaab4b-7ffb0bfaab4e 736->749 751 7ffb0bfaab6f 737->751 738->683 752 7ffb0bfaad51-7ffb0bfaad56 738->752 739->684 742->743 753 7ffb0bfaae61-7ffb0bfaae7a call 7ffb0bfe3420 742->753 754 7ffb0bfaae84-7ffb0bfaae8b 743->754 755 7ffb0bfaae92-7ffb0bfaae9c call 7ffb0c0063c0 743->755 744->745 746 7ffb0bfaace3 745->746 747 7ffb0bfaaca1-7ffb0bfaacb5 call 7ffb0bfa8e70 745->747 760 7ffb0bfaace6-7ffb0bfaace9 746->760 772 7ffb0bfaad33-7ffb0bfaad36 747->772 773 7ffb0bfaacb7-7ffb0bfaaccc 747->773 759 7ffb0bfaab76-7ffb0bfaabf3 748->759 749->712 758 7ffb0bfaab54-7ffb0bfaab58 749->758 751->759 761 7ffb0bfaad63-7ffb0bfaad77 call 7ffb0bfa8e70 752->761 762 7ffb0bfaad58-7ffb0bfaad5d 752->762 754->755 764 7ffb0bfaae8d call 7ffb0c005f00 754->764 755->729 758->751 782 7ffb0bfaabf5-7ffb0bfaabfa 759->782 783 7ffb0bfaac00-7ffb0bfaac47 memchr 759->783 767 7ffb0bfaacf3-7ffb0bfaad01 760->767 768 7ffb0bfaaceb-7ffb0bfaacee call 7ffb0c005f00 760->768 761->683 779 7ffb0bfaad79-7ffb0bfaad7e 761->779 762->683 769 7ffb0bfaad5f-7ffb0bfaad61 762->769 764->755 776 7ffb0bfaad03-7ffb0bfaad08 767->776 777 7ffb0bfaad47 767->777 768->767 769->683 769->761 772->779 780 7ffb0bfaad38-7ffb0bfaad45 call 7ffb0c005f00 772->780 773->746 781 7ffb0bfaacce-7ffb0bfaacd1 773->781 776->682 777->738 779->684 780->684 785 7ffb0bfaacd3-7ffb0bfaacd7 781->785 786 7ffb0bfaacd9-7ffb0bfaace1 781->786 782->783 783->725 785->746 785->786 786->760
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memchrmemmove$_errno
                                                                                        • String ID: Reuse of ChannelBuffer! %p$unable to alloc %u bytes$unknown output translation requested
                                                                                        • API String ID: 180474557-3982423822
                                                                                        • Opcode ID: 3bd9435a87e2fca52b9b06e299af5afd2d65f1067f2a9f04372dd3bee831fb83
                                                                                        • Instruction ID: 95475e09d28e2c6baaead0cdfa5dca0b25a341bd2ad7e9f0271258f678954b9e
                                                                                        • Opcode Fuzzy Hash: 3bd9435a87e2fca52b9b06e299af5afd2d65f1067f2a9f04372dd3bee831fb83
                                                                                        • Instruction Fuzzy Hash: FF0260F260878187E7689F35E544B6AB7A0FB84794F148135DA8E87BA5DF3CE458CB00
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 973 7ff7285d5d9c-7ff7285d5e0f call 7ff7285d5ad0 976 7ff7285d5e11-7ff7285d5e1a call 7ff7285c4454 973->976 977 7ff7285d5e29-7ff7285d5e33 call 7ff7285c6d2c 973->977 982 7ff7285d5e1d-7ff7285d5e24 call 7ff7285c4474 976->982 983 7ff7285d5e35-7ff7285d5e4c call 7ff7285c4454 call 7ff7285c4474 977->983 984 7ff7285d5e4e-7ff7285d5eb7 CreateFileW 977->984 999 7ff7285d616a-7ff7285d618a 982->999 983->982 985 7ff7285d5f34-7ff7285d5f3f GetFileType 984->985 986 7ff7285d5eb9-7ff7285d5ebf 984->986 992 7ff7285d5f41-7ff7285d5f7c GetLastError call 7ff7285c43e8 CloseHandle 985->992 993 7ff7285d5f92-7ff7285d5f99 985->993 989 7ff7285d5f01-7ff7285d5f2f GetLastError call 7ff7285c43e8 986->989 990 7ff7285d5ec1-7ff7285d5ec5 986->990 989->982 990->989 997 7ff7285d5ec7-7ff7285d5eff CreateFileW 990->997 992->982 1008 7ff7285d5f82-7ff7285d5f8d call 7ff7285c4474 992->1008 995 7ff7285d5fa1-7ff7285d5fa4 993->995 996 7ff7285d5f9b-7ff7285d5f9f 993->996 1003 7ff7285d5faa-7ff7285d5fff call 7ff7285c6c44 995->1003 1004 7ff7285d5fa6 995->1004 996->1003 997->985 997->989 1011 7ff7285d6001-7ff7285d600d call 7ff7285d5cd8 1003->1011 1012 7ff7285d601e-7ff7285d604f call 7ff7285d5850 1003->1012 1004->1003 1008->982 1011->1012 1020 7ff7285d600f 1011->1020 1018 7ff7285d6055-7ff7285d6097 1012->1018 1019 7ff7285d6051-7ff7285d6053 1012->1019 1022 7ff7285d60b9-7ff7285d60c4 1018->1022 1023 7ff7285d6099-7ff7285d609d 1018->1023 1021 7ff7285d6011-7ff7285d6019 call 7ff7285c9fc0 1019->1021 1020->1021 1021->999 1025 7ff7285d6168 1022->1025 1026 7ff7285d60ca-7ff7285d60ce 1022->1026 1023->1022 1024 7ff7285d609f-7ff7285d60b4 1023->1024 1024->1022 1025->999 1026->1025 1028 7ff7285d60d4-7ff7285d6119 CloseHandle CreateFileW 1026->1028 1030 7ff7285d611b-7ff7285d6149 GetLastError call 7ff7285c43e8 call 7ff7285c6e6c 1028->1030 1031 7ff7285d614e-7ff7285d6163 1028->1031 1030->1031 1031->1025
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                        • String ID:
                                                                                        • API String ID: 1617910340-0
                                                                                        • Opcode ID: c193deae2c68f2782aecede26064aa5b5da501404692e974333340cb25ef943d
                                                                                        • Instruction ID: 13f3309462eca4375779df76f86e275154209dae8ecf61ee1fb8758feade2442
                                                                                        • Opcode Fuzzy Hash: c193deae2c68f2782aecede26064aa5b5da501404692e974333340cb25ef943d
                                                                                        • Instruction Fuzzy Hash: 4DC1F736B24A4285EB10EF66CC806BDB7A1F749B98B404336DE2E47395CF3AD051CB14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FFB23A3974E), ref: 00007FFB23A3F6B5
                                                                                        • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FFB23A3974E), ref: 00007FFB23A3F6F5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3848653567.00007FFB23A31000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFB23A30000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3848394200.00007FFB23A30000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848963595.00007FFB23A43000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849022884.00007FFB23A4B000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A4F000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A52000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb23a30000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocInfoSystemVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 3440192736-0
                                                                                        • Opcode ID: 84ab6cb48cb822ff48525ea8acba8972981e7d053b81b5f4119e76660008191c
                                                                                        • Instruction ID: 747aa7a3d0731cd6275ef940b607f620b04b6802677fac03559844924e870717
                                                                                        • Opcode Fuzzy Hash: 84ab6cb48cb822ff48525ea8acba8972981e7d053b81b5f4119e76660008191c
                                                                                        • Instruction Fuzzy Hash: 4F0184B5B1928243EE56CB35FC4167DB2A1AF5BF80B484075DA8C66390DF2CE5068700
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 0 7ffb226a34f0-7ffb226a3504 PyThread_allocate_lock 1 7ffb226a3895 0->1 2 7ffb226a350a-7ffb226a3527 PyModule_Create2 0->2 5 7ffb226a3890-7ffb226a3894 1->5 3 7ffb226a3897 2->3 4 7ffb226a352d-7ffb226a354a PyErr_NewException 2->4 8 7ffb226a388b 3->8 6 7ffb226a6c40-7ffb226a6c44 4->6 7 7ffb226a3550-7ffb226a3568 PyModule_AddObject 4->7 9 7ffb226a6c46-7ffb226a6c4a 6->9 10 7ffb226a6c50 6->10 11 7ffb226a356e-7ffb226a358b PyModule_AddIntConstant 7->11 12 7ffb226a6c30-7ffb226a6c34 7->12 8->5 9->10 15 7ffb226a6c57-7ffb226a6c5b 10->15 11->6 13 7ffb226a3591-7ffb226a35a7 PyModule_AddIntConstant 11->13 12->6 14 7ffb226a6c36-7ffb226a6c3a 12->14 13->6 16 7ffb226a35ad-7ffb226a35c3 PyModule_AddIntConstant 13->16 14->6 17 7ffb226a6c67-7ffb226a6c6b 15->17 18 7ffb226a6c5d-7ffb226a6c61 15->18 16->6 19 7ffb226a35c9-7ffb226a35df PyModule_AddIntConstant 16->19 20 7ffb226a6cc5 17->20 21 7ffb226a6c6d-7ffb226a6c77 17->21 18->17 19->6 22 7ffb226a35e5-7ffb226a35fb PyModule_AddIntConstant 19->22 26 7ffb226a6ccc-7ffb226a6cd5 PyErr_Occurred 20->26 32 7ffb226a6c7e-7ffb226a6c82 21->32 22->6 23 7ffb226a3601-7ffb226a3617 PyModule_AddIntConstant 22->23 23->6 25 7ffb226a361d-7ffb226a3633 PyModule_AddIntConstant 23->25 25->6 27 7ffb226a3639-7ffb226a364f PyModule_AddIntConstant 25->27 28 7ffb226a6cd7-7ffb226a6cdb 26->28 29 7ffb226a6cee 26->29 27->6 33 7ffb226a3655-7ffb226a366b PyModule_AddIntConstant 27->33 30 7ffb226a6ce7 28->30 31 7ffb226a6cdd-7ffb226a6ce1 28->31 30->29 31->30 35 7ffb226a6c84-7ffb226a6c88 32->35 36 7ffb226a6c8e-7ffb226a6c92 32->36 33->6 34 7ffb226a3671-7ffb226a368a PyModule_AddStringConstant 33->34 34->6 37 7ffb226a3690-7ffb226a36a9 PyModule_AddStringConstant 34->37 35->36 36->20 38 7ffb226a6c94-7ffb226a6c9e 36->38 37->6 39 7ffb226a36af-7ffb226a36c2 PyType_FromSpec 37->39 45 7ffb226a6ca5-7ffb226a6ca9 38->45 39->6 40 7ffb226a36c8-7ffb226a36eb PyModule_AddObject 39->40 40->15 42 7ffb226a36f1-7ffb226a370b PyType_FromSpec 40->42 43 7ffb226a6cb5-7ffb226a6cb9 42->43 44 7ffb226a3711-7ffb226a372d PyModule_AddObject 42->44 43->20 48 7ffb226a6cbb-7ffb226a6cbf 43->48 44->32 46 7ffb226a3733-7ffb226a374d PyType_FromSpec 44->46 45->43 47 7ffb226a6cab-7ffb226a6caf 45->47 46->43 49 7ffb226a3753-7ffb226a376f PyModule_AddObject 46->49 47->43 48->20 49->45 50 7ffb226a3775-7ffb226a379f Py_GetProgramName PyUnicode_FromWideChar 49->50 51 7ffb226a3865-7ffb226a386e PyErr_Occurred 50->51 52 7ffb226a37a5-7ffb226a37b4 PyUnicode_EncodeFSDefault 50->52 51->28 53 7ffb226a3874-7ffb226a3886 51->53 54 7ffb226a3855-7ffb226a3859 52->54 55 7ffb226a37ba-7ffb226a37ce GetEnvironmentVariableW 52->55 53->8 54->51 56 7ffb226a385b-7ffb226a385f 54->56 55->29 57 7ffb226a37d4-7ffb226a37df GetLastError 55->57 56->51 57->29 58 7ffb226a37e5-7ffb226a37ed call 7ffb226a3e10 57->58 58->26 61 7ffb226a37f3-7ffb226a3804 PyUnicode_AsWideCharString 58->61 61->28 62 7ffb226a380a-7ffb226a382b SetEnvironmentVariableW Tcl_FindExecutable 61->62 63 7ffb226a3845-7ffb226a3849 62->63 64 7ffb226a382d-7ffb226a383f SetEnvironmentVariableW PyMem_Free 62->64 63->54 65 7ffb226a384b-7ffb226a384f 63->65 64->63 65->54
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3847507329.00007FFB226A1000.00000020.00000001.01000000.00000011.sdmp, Offset: 00007FFB226A0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3847353077.00007FFB226A0000.00000002.00000001.01000000.00000011.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3847815700.00007FFB226A9000.00000002.00000001.01000000.00000011.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3847977228.00007FFB226AE000.00000004.00000001.01000000.00000011.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848133790.00007FFB226B0000.00000002.00000001.01000000.00000011.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848133790.00007FFB226B3000.00000002.00000001.01000000.00000011.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb226a0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Module_$Constant$FromUnicode_$String$Object$CharEnvironmentErr_SpecType_VariableWide$OccurredPy_stat$ConcatCreate2DefaultEncodeErrorExceptionExecutableFindFreeLastMem_NamePrefixProgramTcl_Thread_allocate_lock_errno
                                                                                        • String ID: 8.6$ALL_EVENTS$DONT_WAIT$EXCEPTION$FILE_EVENTS$IDLE_EVENTS$READABLE$TCL_LIBRARY$TCL_VERSION$TIMER_EVENTS$TK_VERSION$TclError$Tcl_Obj$TkappType$TkttType$WINDOW_EVENTS$WRITABLE$_tkinter.TclError
                                                                                        • API String ID: 359868275-2041650692
                                                                                        • Opcode ID: 42cfa40096943485daf83acac636cb3b2783fc8096eea56834019b5b9a24866e
                                                                                        • Instruction ID: 6c45b05ef74760532a0923bc1585b8cf867918ebc57a7d55da2b8f0ec364605b
                                                                                        • Opcode Fuzzy Hash: 42cfa40096943485daf83acac636cb3b2783fc8096eea56834019b5b9a24866e
                                                                                        • Instruction Fuzzy Hash: 54C1C7A3A1AA8291FB679F36DC582F933A4FF45B90B584435C90E86760EFACE514C310
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 66 7ffb23a3ab90-7ffb23a3abde 67 7ffb23a3abe0 66->67 68 7ffb23a3abff-7ffb23a3ac1b call 7ffb23a3f850 66->68 69 7ffb23a3abe7-7ffb23a3abf1 PyErr_SetString 67->69 74 7ffb23a3ac1d-7ffb23a3ac24 68->74 75 7ffb23a3ac26-7ffb23a3ac2a 68->75 71 7ffb23a3abf7-7ffb23a3abfa 69->71 73 7ffb23a3ad92-7ffb23a3adae 71->73 74->69 76 7ffb23a3ac2c-7ffb23a3ac44 call 7ffb23a39e60 75->76 77 7ffb23a3ac46-7ffb23a3ac4a 75->77 76->71 76->77 79 7ffb23a3ac4c-7ffb23a3ac55 PyEval_SaveThread 77->79 80 7ffb23a3ac5a-7ffb23a3ac66 77->80 79->80 82 7ffb23a3ac7e-7ffb23a3ac82 80->82 83 7ffb23a3ac68-7ffb23a3ac7c _errno * 2 80->83 84 7ffb23a3ac9b-7ffb23a3acb6 call 7ffb23a3f2c0 82->84 85 7ffb23a3ac84-7ffb23a3ac9a GetLastError SetLastError 82->85 83->82 87 7ffb23a3acbb-7ffb23a3aceb 84->87 85->84 89 7ffb23a3aced-7ffb23a3acfd GetLastError SetLastError 87->89 90 7ffb23a3ad03-7ffb23a3ad07 87->90 89->90 91 7ffb23a3ad1f-7ffb23a3ad22 90->91 92 7ffb23a3ad09-7ffb23a3ad1d _errno * 2 90->92 93 7ffb23a3ad2d-7ffb23a3ad30 91->93 94 7ffb23a3ad24-7ffb23a3ad27 PyEval_RestoreThread 91->94 92->91 95 7ffb23a3ad42-7ffb23a3ad45 93->95 96 7ffb23a3ad32-7ffb23a3ad36 93->96 94->93 97 7ffb23a3ad59-7ffb23a3ad5c 95->97 98 7ffb23a3ad47-7ffb23a3ad54 call 7ffb23a3a2d0 95->98 96->95 99 7ffb23a3ad38-7ffb23a3ad3c 96->99 101 7ffb23a3ad5e-7ffb23a3ad78 PyErr_Format 97->101 102 7ffb23a3ad7d-7ffb23a3ad7f 97->102 98->71 99->95 101->71 104 7ffb23a3ad81-7ffb23a3ad8a PyErr_Occurred 102->104 105 7ffb23a3ad90 102->105 104->71 104->105 105->73
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3848653567.00007FFB23A31000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFB23A30000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3848394200.00007FFB23A30000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848963595.00007FFB23A43000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849022884.00007FFB23A4B000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A4F000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A52000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb23a30000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast_errno$Eval_Thread$Err_RestoreSaveString
                                                                                        • String ID: No ffi_type for result$ffi_call failed with code %d$ffi_prep_cif failed
                                                                                        • API String ID: 1513322974-2927789998
                                                                                        • Opcode ID: c0ac526f3dce3b78aa40cc6b06a24714c86b3836a384f34c20b9349ab6fb7fce
                                                                                        • Instruction ID: 15054922efb4634a4b9e9c1c2062c0210ed11c4594a9692c56125c434f08877a
                                                                                        • Opcode Fuzzy Hash: c0ac526f3dce3b78aa40cc6b06a24714c86b3836a384f34c20b9349ab6fb7fce
                                                                                        • Instruction Fuzzy Hash: 43515DB2A08BD296E6A68F25EC4467D7360FB4AB90F0841B5CA4E63794DF3CE845C701
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 163 7ffb23a367b0-7ffb23a367dd 164 7ffb23a367ec 163->164 165 7ffb23a367df-7ffb23a367ea 163->165 166 7ffb23a367ee-7ffb23a367fd 164->166 165->164 165->166 167 7ffb23a3680b-7ffb23a36812 166->167 168 7ffb23a367ff-7ffb23a36806 166->168 169 7ffb23a3681b-7ffb23a36825 167->169 170 7ffb23a36814 167->170 168->167 171 7ffb23a3682e-7ffb23a36835 169->171 172 7ffb23a36827 169->172 170->169 173 7ffb23a3683e-7ffb23a36862 171->173 174 7ffb23a36837 171->174 172->171 175 7ffb23a3691b-7ffb23a36958 call 7ffb23a362a0 173->175 176 7ffb23a36868-7ffb23a36879 PyTuple_GetItem 173->176 174->173 184 7ffb23a3695e-7ffb23a36961 175->184 185 7ffb23a36892-7ffb23a36894 175->185 177 7ffb23a3687b 176->177 178 7ffb23a36899-7ffb23a368a7 176->178 181 7ffb23a36882-7ffb23a3688c PyErr_SetString 177->181 182 7ffb23a368d1-7ffb23a368d8 178->182 183 7ffb23a368a9-7ffb23a368b1 PyType_IsSubtype 178->183 181->185 187 7ffb23a368de-7ffb23a368e5 182->187 188 7ffb23a369c8 182->188 183->182 186 7ffb23a368b3-7ffb23a368cc PyErr_SetString 183->186 189 7ffb23a369f7-7ffb23a36a27 call 7ffb23a3b250 184->189 190 7ffb23a36967-7ffb23a36976 184->190 191 7ffb23a36a94-7ffb23a36aa8 185->191 186->191 187->188 192 7ffb23a368eb-7ffb23a368f2 187->192 194 7ffb23a369d4-7ffb23a369d7 188->194 198 7ffb23a36a2c-7ffb23a36a32 189->198 190->194 195 7ffb23a36978-7ffb23a3697b 190->195 196 7ffb23a368fd-7ffb23a36916 192->196 197 7ffb23a368f4-7ffb23a368fb 192->197 200 7ffb23a369f2 194->200 201 7ffb23a369d9-7ffb23a369dd 194->201 199 7ffb23a3697d-7ffb23a36981 195->199 195->200 196->175 197->181 202 7ffb23a36a71-7ffb23a36a8f call 7ffb23a36620 198->202 203 7ffb23a36a34-7ffb23a36a37 198->203 204 7ffb23a3698d 199->204 205 7ffb23a36983-7ffb23a36987 199->205 200->189 206 7ffb23a369df-7ffb23a369e3 201->206 207 7ffb23a369e9-7ffb23a369f0 201->207 202->191 203->202 209 7ffb23a36a39-7ffb23a36a5a PyObject_CallFunctionObjArgs 203->209 208 7ffb23a36994-7ffb23a369c3 PyErr_Format 204->208 205->204 206->207 207->208 208->191 211 7ffb23a36a5c-7ffb23a36a5f 209->211 212 7ffb23a36aa9-7ffb23a36aad 209->212 211->212 213 7ffb23a36a61-7ffb23a36a65 211->213 214 7ffb23a36aaf-7ffb23a36ab3 212->214 215 7ffb23a36ab9-7ffb23a36abd 212->215 213->202 218 7ffb23a36a67-7ffb23a36a6b 213->218 214->215 216 7ffb23a36abf-7ffb23a36ac3 215->216 217 7ffb23a36ac9-7ffb23a36acc 215->217 216->217 217->191 218->202
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3848653567.00007FFB23A31000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFB23A30000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3848394200.00007FFB23A30000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848963595.00007FFB23A43000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849022884.00007FFB23A4B000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A4F000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A52000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb23a30000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Err_$String$ArgsCallFormatFunctionItemObject_SubtypeTuple_Type_
                                                                                        • String ID: COM method call without VTable$Expected a COM this pointer as first argument$NULL COM pointer access$native com method call without 'this' parameter$this function takes %d argument%s (%d given)$this function takes at least %d argument%s (%d given)
                                                                                        • API String ID: 2945130406-1981512665
                                                                                        • Opcode ID: 42166504d12159de03bef4256c0d0bc63f64a8e3f20904777ca9a96521d49da9
                                                                                        • Instruction ID: 1d6051dd5e8c11982d94ad16bc5eb67deee933ca79f689c0f4e059ca14f7175e
                                                                                        • Opcode Fuzzy Hash: 42166504d12159de03bef4256c0d0bc63f64a8e3f20904777ca9a96521d49da9
                                                                                        • Instruction Fuzzy Hash: 219152B2B09BC281EB568F2AE88026DB7A0FB4AB84F184075DE4D67764DF3CE445C301
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _fread_nolock$Message_invalid_parameter_noinfo
                                                                                        • String ID: Cannot read Table of Contents.$Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                                                        • API String ID: 2153230061-4158440160
                                                                                        • Opcode ID: a58db326956c9b90b21a42199e162e0aaa72f2e8021fa488068f7a761439957f
                                                                                        • Instruction ID: 0e3cba0304a3d88c1ec15b3499a1a1311ef6789b4626fb3439ea5aca36338454
                                                                                        • Opcode Fuzzy Hash: a58db326956c9b90b21a42199e162e0aaa72f2e8021fa488068f7a761439957f
                                                                                        • Instruction Fuzzy Hash: 9D518E72A0960686EB54EF26DC50279F3A1EF58B84B808137E90C87799DF3DE540CF68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 578 7ffb23a3b250-7ffb23a3b2a5 579 7ffb23a3b2aa-7ffb23a3b2b1 578->579 580 7ffb23a3b2a7 578->580 581 7ffb23a3b2b3-7ffb23a3b2d2 PyErr_Format 579->581 582 7ffb23a3b2d7-7ffb23a3b2f0 579->582 580->579 583 7ffb23a3b616-7ffb23a3b63e call 7ffb23a41450 581->583 584 7ffb23a3b2f2 582->584 585 7ffb23a3b2f5-7ffb23a3b30d call 7ffb23a413e0 582->585 584->585 590 7ffb23a3b31c-7ffb23a3b330 memset 585->590 591 7ffb23a3b30f-7ffb23a3b317 PyErr_NoMemory 585->591 592 7ffb23a3b332-7ffb23a3b336 590->592 593 7ffb23a3b338 590->593 591->583 594 7ffb23a3b33b-7ffb23a3b342 592->594 593->594 595 7ffb23a3b344-7ffb23a3b356 594->595 596 7ffb23a3b358 594->596 597 7ffb23a3b35b-7ffb23a3b35e 595->597 596->597 598 7ffb23a3b41f-7ffb23a3b429 597->598 599 7ffb23a3b364-7ffb23a3b36f 597->599 601 7ffb23a3b42b-7ffb23a3b436 598->601 602 7ffb23a3b484 598->602 600 7ffb23a3b370-7ffb23a3b377 599->600 604 7ffb23a3b3c6-7ffb23a3b3d8 call 7ffb23a3a8b0 600->604 605 7ffb23a3b379-7ffb23a3b37c 600->605 601->602 606 7ffb23a3b438-7ffb23a3b442 601->606 603 7ffb23a3b48b-7ffb23a3b4a8 602->603 608 7ffb23a3b4ad-7ffb23a3b4cd call 7ffb23a413e0 603->608 609 7ffb23a3b4aa 603->609 614 7ffb23a3b3fb-7ffb23a3b412 call 7ffb23a3af20 604->614 617 7ffb23a3b3da-7ffb23a3b3e9 604->617 605->604 610 7ffb23a3b37e-7ffb23a3b393 PyObject_CallFunctionObjArgs 605->610 606->602 611 7ffb23a3b444-7ffb23a3b44f 606->611 626 7ffb23a3b4d2-7ffb23a3b4ea call 7ffb23a413e0 608->626 627 7ffb23a3b4cf 608->627 609->608 610->614 615 7ffb23a3b395-7ffb23a3b3ae call 7ffb23a3a8b0 610->615 611->602 616 7ffb23a3b451-7ffb23a3b457 611->616 632 7ffb23a3b5e5 614->632 634 7ffb23a3b3b0-7ffb23a3b3b4 615->634 635 7ffb23a3b3ba-7ffb23a3b3be 615->635 621 7ffb23a3b47e-7ffb23a3b482 616->621 622 7ffb23a3b459-7ffb23a3b467 616->622 623 7ffb23a3b3eb-7ffb23a3b3f6 617->623 624 7ffb23a3b417-7ffb23a3b41b 617->624 621->603 629 7ffb23a3b46f-7ffb23a3b473 622->629 630 7ffb23a3b469-7ffb23a3b46d 622->630 623->600 624->598 641 7ffb23a3b4ec 626->641 642 7ffb23a3b4ef-7ffb23a3b503 call 7ffb23a413e0 626->642 627->626 629->621 631 7ffb23a3b475-7ffb23a3b47c 629->631 630->602 630->629 631->603 636 7ffb23a3b5e7-7ffb23a3b5ea 632->636 634->635 635->614 638 7ffb23a3b3c0-7ffb23a3b3c4 635->638 639 7ffb23a3b5ec-7ffb23a3b5f0 636->639 640 7ffb23a3b613 636->640 638->617 643 7ffb23a3b5f4-7ffb23a3b5fa 639->643 640->583 641->642 648 7ffb23a3b5df PyErr_NoMemory 642->648 649 7ffb23a3b509-7ffb23a3b50c 642->649 645 7ffb23a3b5fc-7ffb23a3b600 643->645 646 7ffb23a3b609-7ffb23a3b611 643->646 645->646 650 7ffb23a3b602 645->650 646->640 646->643 648->632 649->648 651 7ffb23a3b512-7ffb23a3b515 649->651 650->646 651->648 652 7ffb23a3b51b-7ffb23a3b51e 651->652 653 7ffb23a3b520-7ffb23a3b52d 652->653 654 7ffb23a3b558-7ffb23a3b578 call 7ffb23a3ab90 652->654 655 7ffb23a3b530-7ffb23a3b53d 653->655 659 7ffb23a3b57d-7ffb23a3b580 654->659 657 7ffb23a3b53f-7ffb23a3b545 655->657 658 7ffb23a3b547 655->658 660 7ffb23a3b54a-7ffb23a3b556 657->660 658->660 659->632 661 7ffb23a3b582-7ffb23a3b589 659->661 660->654 660->655 662 7ffb23a3b58b-7ffb23a3b58e 661->662 663 7ffb23a3b5a6-7ffb23a3b5aa 661->663 662->663 666 7ffb23a3b590-7ffb23a3b594 662->666 664 7ffb23a3b5ac-7ffb23a3b5b0 663->664 665 7ffb23a3b5c8-7ffb23a3b5dd call 7ffb23a3adb0 663->665 667 7ffb23a3b5bd-7ffb23a3b5c6 PyLong_FromLong 664->667 668 7ffb23a3b5b2-7ffb23a3b5bb PyErr_SetFromWindowsErr 664->668 665->636 666->667 670 7ffb23a3b596-7ffb23a3b5a4 call 7ffb23a3b080 666->670 667->636 668->636 670->636
                                                                                        APIs
                                                                                        • PyErr_Format.PYTHON37(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FFB23A36A2C), ref: 00007FFB23A3B2CA
                                                                                        • PyErr_NoMemory.PYTHON37(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FFB23A36A2C), ref: 00007FFB23A3B30F
                                                                                        • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FFB23A36A2C), ref: 00007FFB23A3B321
                                                                                        • PyObject_CallFunctionObjArgs.PYTHON37(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FFB23A36A2C), ref: 00007FFB23A3B387
                                                                                        • PyErr_SetFromWindowsErr.PYTHON37(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FFB23A36A2C), ref: 00007FFB23A3B5B2
                                                                                        • PyLong_FromLong.PYTHON37(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FFB23A36A2C), ref: 00007FFB23A3B5BD
                                                                                        • PyErr_NoMemory.PYTHON37(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FFB23A36A2C), ref: 00007FFB23A3B5DF
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3848653567.00007FFB23A31000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFB23A30000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3848394200.00007FFB23A30000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848963595.00007FFB23A43000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849022884.00007FFB23A4B000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A4F000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A52000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb23a30000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Err_$FromMemory$ArgsCallFormatFunctionLongLong_Object_Windowsmemset
                                                                                        • String ID: argument %zd: $too many arguments (%zi), maximum is %i
                                                                                        • API String ID: 1481343769-4072972272
                                                                                        • Opcode ID: 4a43e10d9877858c74111beeb9cdd25e0fb9dda933af145c644094703d4b1676
                                                                                        • Instruction ID: 8b09f2d6da7cde112cb2504ca7b713f7347e288583fb9f55492304c2cfd4bdea
                                                                                        • Opcode Fuzzy Hash: 4a43e10d9877858c74111beeb9cdd25e0fb9dda933af145c644094703d4b1676
                                                                                        • Instruction Fuzzy Hash: 45C1C8A2A0ABC281EA529F35DC402BD2351FF06BE8F584671DA2D67BD5DF3CE5458301
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 788 7ffb23a396f0-7ffb23a39728 PySequence_Size call 7ffb23a39660 791 7ffb23a3973d-7ffb23a39747 788->791 792 7ffb23a3972a-7ffb23a3973c 788->792 793 7ffb23a3975a-7ffb23a39764 791->793 794 7ffb23a39749 call 7ffb23a3f6a0 791->794 796 7ffb23a39768-7ffb23a39779 793->796 797 7ffb23a3974e-7ffb23a39758 794->797 798 7ffb23a3977b-7ffb23a39781 PyErr_NoMemory 796->798 799 7ffb23a39786-7ffb23a3979c 796->799 797->793 797->796 800 7ffb23a39988-7ffb23a3998c 798->800 801 7ffb23a3984d-7ffb23a39864 799->801 802 7ffb23a397a2-7ffb23a397a6 799->802 803 7ffb23a3998e-7ffb23a39992 800->803 804 7ffb23a39998 800->804 806 7ffb23a39866-7ffb23a39875 801->806 807 7ffb23a39877-7ffb23a39882 801->807 805 7ffb23a397b0-7ffb23a397c2 PySequence_GetItem 802->805 803->804 808 7ffb23a3999a-7ffb23a399b6 804->808 805->800 809 7ffb23a397c8-7ffb23a397d3 805->809 810 7ffb23a398b7-7ffb23a398c6 806->810 811 7ffb23a39971-7ffb23a39982 PyErr_SetString 807->811 812 7ffb23a39888-7ffb23a39892 807->812 815 7ffb23a39820 809->815 816 7ffb23a397d5-7ffb23a397df 809->816 813 7ffb23a39908-7ffb23a39922 call 7ffb23a3f850 810->813 814 7ffb23a398c8-7ffb23a398d2 810->814 811->800 812->811 817 7ffb23a39898-7ffb23a3989c 812->817 832 7ffb23a39940-7ffb23a39952 call 7ffb23a3f550 813->832 833 7ffb23a39924 813->833 814->813 818 7ffb23a398d4-7ffb23a398d8 814->818 819 7ffb23a39823-7ffb23a3982a 815->819 816->815 821 7ffb23a397e1-7ffb23a397ec 816->821 817->811 822 7ffb23a398a2-7ffb23a398a9 817->822 818->813 823 7ffb23a398da-7ffb23a398df 818->823 824 7ffb23a3982c-7ffb23a39830 819->824 825 7ffb23a39836-7ffb23a39840 819->825 821->815 827 7ffb23a397ee-7ffb23a397f3 821->827 822->811 828 7ffb23a398af-7ffb23a398b3 822->828 829 7ffb23a398e1-7ffb23a398ef 823->829 830 7ffb23a39904 823->830 824->825 825->805 831 7ffb23a39846 825->831 834 7ffb23a397f5-7ffb23a39803 827->834 835 7ffb23a3981a-7ffb23a3981e 827->835 828->810 836 7ffb23a398f1-7ffb23a398f5 829->836 837 7ffb23a398f7-7ffb23a39902 829->837 830->813 831->801 844 7ffb23a3995d-7ffb23a3996f 832->844 845 7ffb23a39954-7ffb23a3995b 832->845 838 7ffb23a3992b-7ffb23a3993e PyErr_Format 833->838 840 7ffb23a3980b-7ffb23a3980f 834->840 841 7ffb23a39805-7ffb23a39809 834->841 835->819 836->813 836->837 837->813 837->830 838->800 840->835 842 7ffb23a39811-7ffb23a39818 840->842 841->815 841->840 842->819 844->808 845->838
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3848653567.00007FFB23A31000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFB23A30000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3848394200.00007FFB23A30000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848963595.00007FFB23A43000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849022884.00007FFB23A4B000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A4F000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A52000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb23a30000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Err_MemoryObject_Sequence_Size
                                                                                        • String ID: ffi_prep_cif failed with %d$ffi_prep_closure failed with %d$invalid result type for callback function
                                                                                        • API String ID: 1208315163-3338905684
                                                                                        • Opcode ID: 5a5bdcbed1699061499b6d6ced77b4c1814b504b021de3823113de5e4c9dc4a9
                                                                                        • Instruction ID: c431320c1a3ee50dbeaff02b3b4d15eb84f8785daa99c6a67016770c48f9fdde
                                                                                        • Opcode Fuzzy Hash: 5a5bdcbed1699061499b6d6ced77b4c1814b504b021de3823113de5e4c9dc4a9
                                                                                        • Instruction Fuzzy Hash: 3A813FB6A09A8684EA96CF25EC4037D63B4FB56B94F5841BACE4D233A4DF3CD485C341
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message
                                                                                        • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                        • API String ID: 2030045667-3659356012
                                                                                        • Opcode ID: eedf61434d1ecab1a175906ee25a3a7cbf47ca60854ae06de6b2bd1c8b0f3e54
                                                                                        • Instruction ID: b64ddf23d04384f2d5160619629fb6e9a053425045beff20aa2ae1ecc925de13
                                                                                        • Opcode Fuzzy Hash: eedf61434d1ecab1a175906ee25a3a7cbf47ca60854ae06de6b2bd1c8b0f3e54
                                                                                        • Instruction Fuzzy Hash: CF418121A4864281EB54FB13EC412AAE3A0EF547D4FC44433DE4D07B59EE3EE542CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1036 7ff7285b1000-7ff7285b36a6 call 7ff7285bf0b0 call 7ff7285bf0a8 call 7ff7285b7630 call 7ff7285bf0a8 call 7ff7285bade0 call 7ff7285c42a0 call 7ff7285c4f44 call 7ff7285b1af0 1054 7ff7285b37ba 1036->1054 1055 7ff7285b36ac-7ff7285b36bb call 7ff7285b3bc0 1036->1055 1056 7ff7285b37bf-7ff7285b37df call 7ff7285badb0 1054->1056 1055->1054 1061 7ff7285b36c1-7ff7285b36d4 call 7ff7285b3a90 1055->1061 1061->1054 1064 7ff7285b36da-7ff7285b36ed call 7ff7285b3b40 1061->1064 1064->1054 1067 7ff7285b36f3-7ff7285b371a call 7ff7285b69b0 1064->1067 1070 7ff7285b375c-7ff7285b3784 call 7ff7285b6fc0 call 7ff7285b19d0 1067->1070 1071 7ff7285b371c-7ff7285b372b call 7ff7285b69b0 1067->1071 1081 7ff7285b378a-7ff7285b37a0 call 7ff7285b19d0 1070->1081 1082 7ff7285b386d-7ff7285b387e 1070->1082 1071->1070 1076 7ff7285b372d-7ff7285b3733 1071->1076 1079 7ff7285b373f-7ff7285b3759 call 7ff7285c40cc call 7ff7285b6fc0 1076->1079 1080 7ff7285b3735-7ff7285b373d 1076->1080 1079->1070 1080->1079 1093 7ff7285b37a2-7ff7285b37b5 call 7ff7285b2770 1081->1093 1094 7ff7285b37e0-7ff7285b37e3 1081->1094 1086 7ff7285b3880-7ff7285b388a call 7ff7285b32a0 1082->1086 1087 7ff7285b3893-7ff7285b38ab call 7ff7285b7a60 1082->1087 1101 7ff7285b38cb-7ff7285b38d8 call 7ff7285b5e60 1086->1101 1102 7ff7285b388c 1086->1102 1097 7ff7285b38ad-7ff7285b38b9 call 7ff7285b2770 1087->1097 1098 7ff7285b38be-7ff7285b38c5 SetDllDirectoryW 1087->1098 1093->1054 1094->1082 1100 7ff7285b37e9-7ff7285b3800 call 7ff7285b3cd0 1094->1100 1097->1054 1098->1101 1111 7ff7285b3802-7ff7285b3805 1100->1111 1112 7ff7285b3807-7ff7285b3833 call 7ff7285b7230 1100->1112 1109 7ff7285b3926-7ff7285b392b call 7ff7285b5de0 1101->1109 1110 7ff7285b38da-7ff7285b38ea call 7ff7285b5b00 1101->1110 1102->1087 1119 7ff7285b3930-7ff7285b3933 1109->1119 1110->1109 1126 7ff7285b38ec-7ff7285b38fb call 7ff7285b5660 1110->1126 1116 7ff7285b3842-7ff7285b3858 call 7ff7285b2770 1111->1116 1121 7ff7285b3835-7ff7285b383d call 7ff7285bf2dc 1112->1121 1122 7ff7285b385d-7ff7285b386b 1112->1122 1116->1054 1124 7ff7285b39e6-7ff7285b39f5 call 7ff7285b3130 1119->1124 1125 7ff7285b3939-7ff7285b3946 1119->1125 1121->1116 1122->1086 1124->1054 1136 7ff7285b39fb-7ff7285b3a32 call 7ff7285b6f50 call 7ff7285b69b0 call 7ff7285b53f0 1124->1136 1128 7ff7285b3950-7ff7285b395a 1125->1128 1139 7ff7285b38fd-7ff7285b3909 call 7ff7285b55e0 1126->1139 1140 7ff7285b391c-7ff7285b3921 call 7ff7285b58b0 1126->1140 1132 7ff7285b3963-7ff7285b3965 1128->1132 1133 7ff7285b395c-7ff7285b3961 1128->1133 1137 7ff7285b39b1-7ff7285b39bc call 7ff7285b3290 call 7ff7285b30d0 1132->1137 1138 7ff7285b3967-7ff7285b398a call 7ff7285b1b30 1132->1138 1133->1128 1133->1132 1136->1054 1163 7ff7285b3a38-7ff7285b3a6d call 7ff7285b3290 call 7ff7285b7000 call 7ff7285b58b0 call 7ff7285b5de0 1136->1163 1157 7ff7285b39c1-7ff7285b39e1 call 7ff7285b3280 call 7ff7285b58b0 call 7ff7285b5de0 1137->1157 1138->1054 1150 7ff7285b3990-7ff7285b399b 1138->1150 1139->1140 1151 7ff7285b390b-7ff7285b391a call 7ff7285b5cb0 1139->1151 1140->1109 1154 7ff7285b39a0-7ff7285b39af 1150->1154 1151->1119 1154->1137 1154->1154 1157->1056 1176 7ff7285b3a6f-7ff7285b3a72 call 7ff7285b6cc0 1163->1176 1177 7ff7285b3a77-7ff7285b3a81 call 7ff7285b1ab0 1163->1177 1176->1177 1177->1056
                                                                                        APIs
                                                                                          • Part of subcall function 00007FF7285B3BC0: GetModuleFileNameW.KERNEL32(?,00007FF7285B36B9), ref: 00007FF7285B3BF1
                                                                                        • SetDllDirectoryW.KERNEL32 ref: 00007FF7285B38C5
                                                                                          • Part of subcall function 00007FF7285B69B0: GetEnvironmentVariableW.KERNEL32(00007FF7285B3707), ref: 00007FF7285B69EA
                                                                                          • Part of subcall function 00007FF7285B69B0: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF7285B6A07
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                                                        • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                                                        • API String ID: 2344891160-3602715111
                                                                                        • Opcode ID: c5f5eef7b4a042dd9d8a0e14ff0f879b937fc631330a17e8a3c41d0f3a6f4d21
                                                                                        • Instruction ID: 2cb4643f963b0dcb752a97e2a25acee54cc67543c165ff9862102f921bd787fe
                                                                                        • Opcode Fuzzy Hash: c5f5eef7b4a042dd9d8a0e14ff0f879b937fc631330a17e8a3c41d0f3a6f4d21
                                                                                        • Instruction Fuzzy Hash: DAB19221A1C58341FB65BB239C512FDD291EF60784FC44033EA4D5779EEE2EE6098B68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1181 7ff7285b1050-7ff7285b10ab call 7ff7285ba640 1184 7ff7285b10d3-7ff7285b10eb call 7ff7285c40e0 1181->1184 1185 7ff7285b10ad-7ff7285b10d2 call 7ff7285b2770 1181->1185 1190 7ff7285b1109-7ff7285b1119 call 7ff7285c40e0 1184->1190 1191 7ff7285b10ed-7ff7285b1104 call 7ff7285b24d0 1184->1191 1197 7ff7285b1137-7ff7285b1147 1190->1197 1198 7ff7285b111b-7ff7285b1132 call 7ff7285b24d0 1190->1198 1196 7ff7285b126c-7ff7285b1281 call 7ff7285ba320 call 7ff7285c40cc * 2 1191->1196 1214 7ff7285b1286-7ff7285b12a0 1196->1214 1201 7ff7285b1150-7ff7285b1175 call 7ff7285bf62c 1197->1201 1198->1196 1207 7ff7285b125e 1201->1207 1208 7ff7285b117b-7ff7285b1185 call 7ff7285bf3a0 1201->1208 1212 7ff7285b1264 1207->1212 1208->1207 1215 7ff7285b118b-7ff7285b1197 1208->1215 1212->1196 1216 7ff7285b11a0-7ff7285b11b5 call 7ff7285b8a90 1215->1216 1218 7ff7285b11ba-7ff7285b11c8 1216->1218 1219 7ff7285b1241-7ff7285b125c call 7ff7285b2770 1218->1219 1220 7ff7285b11ca-7ff7285b11cd 1218->1220 1219->1212 1221 7ff7285b11cf-7ff7285b11d9 1220->1221 1222 7ff7285b123c 1220->1222 1224 7ff7285b1203-7ff7285b1206 1221->1224 1225 7ff7285b11db-7ff7285b11f0 call 7ff7285bfd6c 1221->1225 1222->1219 1227 7ff7285b1219-7ff7285b121e 1224->1227 1228 7ff7285b1208-7ff7285b1216 call 7ff7285bbb90 1224->1228 1236 7ff7285b11f2-7ff7285b11fc call 7ff7285bf3a0 1225->1236 1237 7ff7285b11fe-7ff7285b1201 1225->1237 1227->1216 1231 7ff7285b1220-7ff7285b1223 1227->1231 1228->1227 1234 7ff7285b1225-7ff7285b1228 1231->1234 1235 7ff7285b1237-7ff7285b123a 1231->1235 1234->1219 1238 7ff7285b122a-7ff7285b1232 1234->1238 1235->1212 1236->1227 1236->1237 1237->1219 1238->1201
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message
                                                                                        • String ID: 1.2.13$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                                        • API String ID: 2030045667-1655038675
                                                                                        • Opcode ID: 312e89c64e0b6f6ef45e45f9001909aaa501356469abec2507ecf3f4d453d2d5
                                                                                        • Instruction ID: ca289dca383cafdec207b980fa48326dd3bae46dfeb45a7c9b9d0e4d5e6cc827
                                                                                        • Opcode Fuzzy Hash: 312e89c64e0b6f6ef45e45f9001909aaa501356469abec2507ecf3f4d453d2d5
                                                                                        • Instruction Fuzzy Hash: 1251C622A0964285EB60BB53EC403BAE291FB54794FC44133EE4D47789EE3EE555CB28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1241 7ffb23a35ed0-7ffb23a35eef 1242 7ffb23a35ef1-7ffb23a35f08 call 7ffb23a35400 1241->1242 1243 7ffb23a35f09-7ffb23a35f0d 1241->1243 1245 7ffb23a35f3e-7ffb23a35f42 1243->1245 1246 7ffb23a35f0f-7ffb23a35f21 1243->1246 1248 7ffb23a35f73-7ffb23a35f7c 1245->1248 1249 7ffb23a35f44-7ffb23a35f56 1245->1249 1246->1245 1247 7ffb23a35f23-7ffb23a35f3d call 7ffb23a35b60 1246->1247 1253 7ffb23a35f7e-7ffb23a35f90 1248->1253 1254 7ffb23a35fd8-7ffb23a35fef _PyArg_ParseTuple_SizeT 1248->1254 1249->1248 1252 7ffb23a35f58-7ffb23a35f72 call 7ffb23a35dd0 1249->1252 1253->1254 1259 7ffb23a35f92-7ffb23a35f9e PyLong_AsVoidPtr 1253->1259 1255 7ffb23a36101 1254->1255 1256 7ffb23a35ff5-7ffb23a36002 PyCallable_Check 1254->1256 1265 7ffb23a36103-7ffb23a36117 1255->1265 1260 7ffb23a36010-7ffb23a3601b 1256->1260 1261 7ffb23a36004-7ffb23a3600b 1256->1261 1263 7ffb23a35faf-7ffb23a35fc3 call 7ffb23a35400 1259->1263 1264 7ffb23a35fa0-7ffb23a35fa9 PyErr_Occurred 1259->1264 1267 7ffb23a36021-7ffb23a3602b 1260->1267 1268 7ffb23a360ea 1260->1268 1266 7ffb23a360f1-7ffb23a360fb PyErr_SetString 1261->1266 1263->1255 1273 7ffb23a35fc9-7ffb23a35fd3 1263->1273 1264->1255 1264->1263 1266->1255 1267->1268 1270 7ffb23a36031-7ffb23a3603c 1267->1270 1268->1266 1270->1268 1272 7ffb23a36042-7ffb23a3604c 1270->1272 1272->1268 1274 7ffb23a36052-7ffb23a36065 call 7ffb23a396f0 1272->1274 1273->1265 1276 7ffb23a3606a-7ffb23a36070 1274->1276 1276->1255 1277 7ffb23a36076-7ffb23a3608a call 7ffb23a35400 1276->1277 1280 7ffb23a3609e-7ffb23a360d1 call 7ffb23a347a0 1277->1280 1281 7ffb23a3608c-7ffb23a36090 1277->1281 1286 7ffb23a360e5-7ffb23a360e8 1280->1286 1287 7ffb23a360d3-7ffb23a360d7 1280->1287 1281->1255 1283 7ffb23a36092-7ffb23a3609c 1281->1283 1283->1255 1286->1265 1287->1255 1288 7ffb23a360d9-7ffb23a360e3 1287->1288 1288->1255
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3848653567.00007FFB23A31000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFB23A30000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3848394200.00007FFB23A30000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848963595.00007FFB23A43000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849022884.00007FFB23A4B000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A4F000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A52000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb23a30000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: argument must be callable or integer function address$cannot construct instance of this class: no argtypes
                                                                                        • API String ID: 0-2742191083
                                                                                        • Opcode ID: dd9853c1f894a6dfee9ede0c551810b272790cb1751b7a70ac6bc2b22a19831a
                                                                                        • Instruction ID: 9bc137587aad63976f587ad543c2e806e5b11466186cde828262b877b8da6bfd
                                                                                        • Opcode Fuzzy Hash: dd9853c1f894a6dfee9ede0c551810b272790cb1751b7a70ac6bc2b22a19831a
                                                                                        • Instruction Fuzzy Hash: D35130A1B09B8181EB969B2AE8912AD63A0FF46FC4F5C8071DF4D177A5DF2DE4518301
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1290 7ff7285caf5c-7ff7285caf82 1291 7ff7285caf84-7ff7285caf98 call 7ff7285c4454 call 7ff7285c4474 1290->1291 1292 7ff7285caf9d-7ff7285cafa1 1290->1292 1310 7ff7285cb38e 1291->1310 1294 7ff7285cb377-7ff7285cb383 call 7ff7285c4454 call 7ff7285c4474 1292->1294 1295 7ff7285cafa7-7ff7285cafae 1292->1295 1312 7ff7285cb389 call 7ff7285c9de0 1294->1312 1295->1294 1298 7ff7285cafb4-7ff7285cafe2 1295->1298 1298->1294 1299 7ff7285cafe8-7ff7285cafef 1298->1299 1302 7ff7285caff1-7ff7285cb003 call 7ff7285c4454 call 7ff7285c4474 1299->1302 1303 7ff7285cb008-7ff7285cb00b 1299->1303 1302->1312 1308 7ff7285cb373-7ff7285cb375 1303->1308 1309 7ff7285cb011-7ff7285cb017 1303->1309 1313 7ff7285cb391-7ff7285cb3a8 1308->1313 1309->1308 1314 7ff7285cb01d-7ff7285cb020 1309->1314 1310->1313 1312->1310 1314->1302 1317 7ff7285cb022-7ff7285cb047 1314->1317 1319 7ff7285cb049-7ff7285cb04b 1317->1319 1320 7ff7285cb07a-7ff7285cb081 1317->1320 1323 7ff7285cb072-7ff7285cb078 1319->1323 1324 7ff7285cb04d-7ff7285cb054 1319->1324 1321 7ff7285cb083-7ff7285cb0ab call 7ff7285ccafc call 7ff7285c9e48 * 2 1320->1321 1322 7ff7285cb056-7ff7285cb06d call 7ff7285c4454 call 7ff7285c4474 call 7ff7285c9de0 1320->1322 1353 7ff7285cb0ad-7ff7285cb0c3 call 7ff7285c4474 call 7ff7285c4454 1321->1353 1354 7ff7285cb0c8-7ff7285cb0f3 call 7ff7285cb784 1321->1354 1351 7ff7285cb200 1322->1351 1325 7ff7285cb0f8-7ff7285cb10f 1323->1325 1324->1322 1324->1323 1328 7ff7285cb111-7ff7285cb119 1325->1328 1329 7ff7285cb18a-7ff7285cb194 call 7ff7285d2a6c 1325->1329 1328->1329 1332 7ff7285cb11b-7ff7285cb11d 1328->1332 1340 7ff7285cb21e 1329->1340 1341 7ff7285cb19a-7ff7285cb1af 1329->1341 1332->1329 1338 7ff7285cb11f-7ff7285cb135 1332->1338 1338->1329 1343 7ff7285cb137-7ff7285cb143 1338->1343 1349 7ff7285cb223-7ff7285cb243 ReadFile 1340->1349 1341->1340 1345 7ff7285cb1b1-7ff7285cb1c3 GetConsoleMode 1341->1345 1343->1329 1347 7ff7285cb145-7ff7285cb147 1343->1347 1345->1340 1350 7ff7285cb1c5-7ff7285cb1cd 1345->1350 1347->1329 1352 7ff7285cb149-7ff7285cb161 1347->1352 1355 7ff7285cb33d-7ff7285cb346 GetLastError 1349->1355 1356 7ff7285cb249-7ff7285cb251 1349->1356 1350->1349 1359 7ff7285cb1cf-7ff7285cb1f1 ReadConsoleW 1350->1359 1362 7ff7285cb203-7ff7285cb20d call 7ff7285c9e48 1351->1362 1352->1329 1363 7ff7285cb163-7ff7285cb16f 1352->1363 1353->1351 1354->1325 1360 7ff7285cb363-7ff7285cb366 1355->1360 1361 7ff7285cb348-7ff7285cb35e call 7ff7285c4474 call 7ff7285c4454 1355->1361 1356->1355 1357 7ff7285cb257 1356->1357 1365 7ff7285cb25e-7ff7285cb273 1357->1365 1367 7ff7285cb1f3 GetLastError 1359->1367 1368 7ff7285cb212-7ff7285cb21c 1359->1368 1372 7ff7285cb36c-7ff7285cb36e 1360->1372 1373 7ff7285cb1f9-7ff7285cb1fb call 7ff7285c43e8 1360->1373 1361->1351 1362->1313 1363->1329 1371 7ff7285cb171-7ff7285cb173 1363->1371 1365->1362 1375 7ff7285cb275-7ff7285cb280 1365->1375 1367->1373 1368->1365 1371->1329 1379 7ff7285cb175-7ff7285cb185 1371->1379 1372->1362 1373->1351 1382 7ff7285cb282-7ff7285cb29b call 7ff7285cab74 1375->1382 1383 7ff7285cb2a7-7ff7285cb2af 1375->1383 1379->1329 1390 7ff7285cb2a0-7ff7285cb2a2 1382->1390 1386 7ff7285cb2b1-7ff7285cb2c3 1383->1386 1387 7ff7285cb32b-7ff7285cb338 call 7ff7285ca9b4 1383->1387 1391 7ff7285cb2c5 1386->1391 1392 7ff7285cb31e-7ff7285cb326 1386->1392 1387->1390 1390->1362 1394 7ff7285cb2ca-7ff7285cb2d1 1391->1394 1392->1362 1395 7ff7285cb2d3-7ff7285cb2d7 1394->1395 1396 7ff7285cb30d-7ff7285cb318 1394->1396 1397 7ff7285cb2f3 1395->1397 1398 7ff7285cb2d9-7ff7285cb2e0 1395->1398 1396->1392 1400 7ff7285cb2f9-7ff7285cb309 1397->1400 1398->1397 1399 7ff7285cb2e2-7ff7285cb2e6 1398->1399 1399->1397 1402 7ff7285cb2e8-7ff7285cb2f1 1399->1402 1400->1394 1401 7ff7285cb30b 1400->1401 1401->1392 1402->1400
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: c293431715d814bc6224c4f6359184f2bfa5931b9749b050cf8314bd88f6e551
                                                                                        • Instruction ID: 300c952063c4e7f17ae00770a211429e6c839092257f003bd26428f39c276061
                                                                                        • Opcode Fuzzy Hash: c293431715d814bc6224c4f6359184f2bfa5931b9749b050cf8314bd88f6e551
                                                                                        • Instruction Fuzzy Hash: 5FC1C42290CA8691EB51AB169C402BEF7A0FB81B80FD54132DA5D07791CF7EE855CF39
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalLeaveSection
                                                                                        • String ID: PGV Initializer did not initialize$unable to alloc %u bytes
                                                                                        • API String ID: 3988221542-3767161943
                                                                                        • Opcode ID: ca7337391dfdd02d6ed248d97723b524b3fb7f21705eed61be379b67bf146c2d
                                                                                        • Instruction ID: b1fcab47593c6a5364243001381e370530e4b74362d59f4102cf52ed66df39a4
                                                                                        • Opcode Fuzzy Hash: ca7337391dfdd02d6ed248d97723b524b3fb7f21705eed61be379b67bf146c2d
                                                                                        • Instruction Fuzzy Hash: DC6184F2A09A4296EA14DF62E5586B97360FF44B80F448436DF1E43B66EF3CE465C344
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                        • String ID:
                                                                                        • API String ID: 1452418845-0
                                                                                        • Opcode ID: bbd3b8ba5c4b27b365bd4a2e4f7617ab8f70cbce2ec9e80b5769bfa1af1ddc25
                                                                                        • Instruction ID: 520fe843466236ec6a698f72044791271bb7c08f0a9c0826c1ca3b280b85c9a8
                                                                                        • Opcode Fuzzy Hash: bbd3b8ba5c4b27b365bd4a2e4f7617ab8f70cbce2ec9e80b5769bfa1af1ddc25
                                                                                        • Instruction Fuzzy Hash: 37314910E0890745FB54BB639C523B9E291EFA1344FC40036E94D473DBDEAEA8048F7A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 1279662727-0
                                                                                        • Opcode ID: 83f7356e998cb81ecf05bcbd92d34611756d56775b93fee33aed4649b58a8721
                                                                                        • Instruction ID: 6a31145fa0218ac2e7dbb9da75c00d64ff9d44b8ecda5970ecaeb26b11dcac29
                                                                                        • Opcode Fuzzy Hash: 83f7356e998cb81ecf05bcbd92d34611756d56775b93fee33aed4649b58a8721
                                                                                        • Instruction Fuzzy Hash: F041E522D1878283E714AB229D00779E3A0FB957A4F50C336EA5C03AD1DF6DA0E58F24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CommConsoleErrorFileLastModeStateType
                                                                                        • String ID:
                                                                                        • API String ID: 3984557487-0
                                                                                        • Opcode ID: 05380490b17c4b79fbd573c98fbb523210e80e337488ba6d70ab4851e6a93b12
                                                                                        • Instruction ID: f11e80ca33a31c3ad0f7066fe6288236dfa1543c08a0cbfbbf758df946f0d331
                                                                                        • Opcode Fuzzy Hash: 05380490b17c4b79fbd573c98fbb523210e80e337488ba6d70ab4851e6a93b12
                                                                                        • Instruction Fuzzy Hash: B7015EE070874282F7609F35E988A3A62A9EF88BD1F444534DA4D82695EF2CD484CA08
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: wsprintf
                                                                                        • String ID: cp%d
                                                                                        • API String ID: 2111968516-4262107655
                                                                                        • Opcode ID: 6cc3930b147f8eff0c61a20dc728995a34f828be1bcd2cf6517a72a999ef8715
                                                                                        • Instruction ID: e67370d82a41b0857a99933da1e4c1bf0963def7e91a45828baef73e30c466ec
                                                                                        • Opcode Fuzzy Hash: 6cc3930b147f8eff0c61a20dc728995a34f828be1bcd2cf6517a72a999ef8715
                                                                                        • Instruction Fuzzy Hash: 92115EF161CA8585EB609B30E4597AA67A0FF89754F405335E69D437D5EF3CD104CB08
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalLeaveSection
                                                                                        • String ID:
                                                                                        • API String ID: 3988221542-0
                                                                                        • Opcode ID: 989d881189fd1461a8ee1ecdafb325d6020b977e6c84d3a5c675026cea46c341
                                                                                        • Instruction ID: 847177fc59ee39d30453ace56a794601cba0b8c5a5e041a84b5ea50b8e5a4b40
                                                                                        • Opcode Fuzzy Hash: 989d881189fd1461a8ee1ecdafb325d6020b977e6c84d3a5c675026cea46c341
                                                                                        • Instruction Fuzzy Hash: 2311ECE0E09A0781FE01ABB5E899A752360EF45B14F14C471C95E872A2FF6CE489C34C
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: 6e39a4990c8b624cfa1a2e234b536a2deb954da16846b7e811d39c9037f986fa
                                                                                        • Instruction ID: f4217ce442b79f5799f80ba60c0f6ec3bcfb6c0e8ed9723483f046e19f44d2d4
                                                                                        • Opcode Fuzzy Hash: 6e39a4990c8b624cfa1a2e234b536a2deb954da16846b7e811d39c9037f986fa
                                                                                        • Instruction Fuzzy Hash: DC51F961A0964246EB28AE279C0067EE691EF50BB4F945732DD6C43BDDCF3ED4018E28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Initialize_invalid_parameter_noinfo_set_fmode
                                                                                        • String ID:
                                                                                        • API String ID: 3548387204-0
                                                                                        • Opcode ID: 1e90ea8750eee40ec6509e71a0aeef04b9b8875fa73e4f4fdef0a793ea833389
                                                                                        • Instruction ID: 5de764a55dcfe8c2a4ef59c0a6b5936fd875439c4289fbda5084493d44fec18e
                                                                                        • Opcode Fuzzy Hash: 1e90ea8750eee40ec6509e71a0aeef04b9b8875fa73e4f4fdef0a793ea833389
                                                                                        • Instruction Fuzzy Hash: 5B115550E08A0741FB187BB74C562FAC581DFA0344FC44436E91E463DBAE9FA9858E7A
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FindCloseChangeNotification.KERNEL32(?,?,?,00007FF7285C9ED5,?,?,00000000,00007FF7285C9F8A), ref: 00007FF7285CA0C6
                                                                                        • GetLastError.KERNEL32(?,?,?,00007FF7285C9ED5,?,?,00000000,00007FF7285C9F8A), ref: 00007FF7285CA0D0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ChangeCloseErrorFindLastNotification
                                                                                        • String ID:
                                                                                        • API String ID: 1687624791-0
                                                                                        • Opcode ID: 92f4f4d1d4744ab8e3e5075f9c3f1c4e1aa1a51ff1876d4144c1ee488cb6abae
                                                                                        • Instruction ID: 917807e1695bf29671b74308debc136d145539908cba134875ca8a1736600a7a
                                                                                        • Opcode Fuzzy Hash: 92f4f4d1d4744ab8e3e5075f9c3f1c4e1aa1a51ff1876d4144c1ee488cb6abae
                                                                                        • Instruction Fuzzy Hash: 5021B051F0864240FB52A722AC54379DAD1EF44BE0F84423AEA2E472C6CE6EA4548F38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • SetFilePointerEx.KERNEL32(?,?,?,?,00000000,00007FF7285CB7CD), ref: 00007FF7285CB680
                                                                                        • GetLastError.KERNEL32(?,?,?,?,00000000,00007FF7285CB7CD), ref: 00007FF7285CB68A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastPointer
                                                                                        • String ID:
                                                                                        • API String ID: 2976181284-0
                                                                                        • Opcode ID: c2ae5bf7dfd723bcaf49b473343ea681dff7813d4b8ca545b941fb3c7d872366
                                                                                        • Instruction ID: 54e16bd3b9b4afbcd67168fa818ac2fb102f9929fd65f5e6e1853f7a9107e39f
                                                                                        • Opcode Fuzzy Hash: c2ae5bf7dfd723bcaf49b473343ea681dff7813d4b8ca545b941fb3c7d872366
                                                                                        • Instruction Fuzzy Hash: B4118F62A18A8181DB20AB26EC44169E761EB45BF4FD44332EE7D0B7E9CF7DD0508F54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E5E
                                                                                        • GetLastError.KERNEL32(?,?,?,00007FF7285D1E72,?,?,?,00007FF7285D1EAF,?,?,00000000,00007FF7285D2375,?,?,?,00007FF7285D22A7), ref: 00007FF7285C9E68
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: BoundaryDeleteDescriptorErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 2050971199-0
                                                                                        • Opcode ID: 90a3e1b0ca63f129125972b75d02b7296718c6d583bf4673ea5362494b00de43
                                                                                        • Instruction ID: 0258bc3d07d039ca90d8cb3c61cc8f9bdedc1f516f5270944ea97429f7cbc0a1
                                                                                        • Opcode Fuzzy Hash: 90a3e1b0ca63f129125972b75d02b7296718c6d583bf4673ea5362494b00de43
                                                                                        • Instruction Fuzzy Hash: DEE08650F0960243FF15BFF35C44276D161DF94B41BC44036DC0D42251DF2D64558E78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: cd414821b6f546225101efcda0891026701ff68dd4107860c76c66003ece607e
                                                                                        • Instruction ID: d596a5764277e765c762ae3daaa62dc54f3ff05dcc6f2d9f5fbbe9b3412056d4
                                                                                        • Opcode Fuzzy Hash: cd414821b6f546225101efcda0891026701ff68dd4107860c76c66003ece607e
                                                                                        • Instruction Fuzzy Hash: EF41B63291864187EB24EA2BAD41279F3A1EB55B81F940132D68E837D1CF7EE402CF75
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _fread_nolock
                                                                                        • String ID:
                                                                                        • API String ID: 840049012-0
                                                                                        • Opcode ID: b2aeaacc0ea2b83f5e39cdcc5b8e75576fef10e1c47f5cf5c02fce4e32c2e81b
                                                                                        • Instruction ID: 505af5d9f6a197f4a51922e79562cb3e13d58d41e138a094fdac80c3c7e86ba8
                                                                                        • Opcode Fuzzy Hash: b2aeaacc0ea2b83f5e39cdcc5b8e75576fef10e1c47f5cf5c02fce4e32c2e81b
                                                                                        • Instruction Fuzzy Hash: 2721B421B0925246FB64BB176C047BAE651FF55BD4FC89432EE0C0778ACE3EE001CA28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: ed84351809cde4536ca700848f8c62e7ec7fc76e9a5c5d8c324986761f842a2a
                                                                                        • Instruction ID: ccab7828085031c922d491712f8ffa619848f956a062a5f961969a25b81a5aa8
                                                                                        • Opcode Fuzzy Hash: ed84351809cde4536ca700848f8c62e7ec7fc76e9a5c5d8c324986761f842a2a
                                                                                        • Instruction Fuzzy Hash: 733190B1A1865281F712BF568C4037CEA60EF40B90F914237EA2D073D2CF7EA8518E78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: be1079961907d1906d587a3e65c1e024338dd0a3e917ec7f85ba85c18500dcb2
                                                                                        • Instruction ID: 5929b8598b474cffdd7b342aefedda29e52bf7770ceccd4e1709416ff8955d6e
                                                                                        • Opcode Fuzzy Hash: be1079961907d1906d587a3e65c1e024338dd0a3e917ec7f85ba85c18500dcb2
                                                                                        • Instruction Fuzzy Hash: 79116F25A0C64181EB60BF529C4027AE260FF85B81F944433EA8C57A96CF7ED5008F78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: bfd0dbd31329e8855e2ea518bb8c472100a71056899b27504ce81c8632d734fa
                                                                                        • Instruction ID: 8aacb6b9f5770e190262f9a8cb1d976f5a99b787931b0988fceff519d60cc858
                                                                                        • Opcode Fuzzy Hash: bfd0dbd31329e8855e2ea518bb8c472100a71056899b27504ce81c8632d734fa
                                                                                        • Instruction Fuzzy Hash: 49219532A18A4187D761AF1ADC40379F6A0EB84B94FA44236DA6D476D6DF3ED404CF14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: f8ccbbb08b6b64fca274b3102351a157ba9f641dbe881e0fbefe782dfe020abd
                                                                                        • Instruction ID: 843c1c6e74daa547f86ac2925a51197030e74c11724b09fd4c7bcbdbf9d828f2
                                                                                        • Opcode Fuzzy Hash: f8ccbbb08b6b64fca274b3102351a157ba9f641dbe881e0fbefe782dfe020abd
                                                                                        • Instruction Fuzzy Hash: 34018E21A0874241EB04EF539D0116DE691EB95FE4B989632DE9C17BEACE3ED4418F28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 3215553584-0
                                                                                        • Opcode ID: ff7701af8cb768011259a96fb0cdaae69b45464d9f9b930ea94a69369e7e69e2
                                                                                        • Instruction ID: edc3e895d06d99b833daa38d9c3c9fb277b25c6440c4c62532ebe8f6929e9836
                                                                                        • Opcode Fuzzy Hash: ff7701af8cb768011259a96fb0cdaae69b45464d9f9b930ea94a69369e7e69e2
                                                                                        • Instruction Fuzzy Hash: 13119A3291864282F300AB06AC40529FAE1EB85740F85003AE64D47AA3DF7EF910CF38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF7285CA8E6,?,?,?,00007FF7285C9AA3,?,?,00000000,00007FF7285C9D3E), ref: 00007FF7285CDDC5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: 71284afaabaf46e061be5dd41c1ee9242f4793079330fcfb9ee2b8ac464e22c2
                                                                                        • Instruction ID: b6d9bbf59a4d5c3bab0f93210faba226941fa6463a82a3219ceadb858fea91ba
                                                                                        • Opcode Fuzzy Hash: 71284afaabaf46e061be5dd41c1ee9242f4793079330fcfb9ee2b8ac464e22c2
                                                                                        • Instruction Fuzzy Hash: 0FF04984F0920641FF5576635C503B6D290DF49B80F8C8472C90EC6282DF1EF4908E38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(?,?,?,00007FF7285BFE74,?,?,?,00007FF7285C1386,?,?,?,?,?,00007FF7285C2979), ref: 00007FF7285CCB3A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: a7ce567b16112f19067e33b9dc0b94b4c499acd5a025fbf7a889946ef18f26a1
                                                                                        • Instruction ID: 0b5c76a71533837e73655ff4cd7fd366304cc596865a573d052cf1d0e1800386
                                                                                        • Opcode Fuzzy Hash: a7ce567b16112f19067e33b9dc0b94b4c499acd5a025fbf7a889946ef18f26a1
                                                                                        • Instruction Fuzzy Hash: 14F03450B0C24641FF64B6A35C50675D580CF487A8FC84632DC2E962E2DE2EA940DD38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00007FF7285B7A60: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7285B26FB), ref: 00007FF7285B7A9A
                                                                                        • LoadLibraryW.KERNEL32(?,?,00000000,00007FF7285B30DE), ref: 00007FF7285B7203
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharLibraryLoadMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 2592636585-0
                                                                                        • Opcode ID: edefa25e46c0851931953bc47b51b44f59ff3e2eca058ac218ee4e6c5736bcfd
                                                                                        • Instruction ID: 5a52f0cb87d5a4b95571273a1b836de0af1dee4bcb7b67ae8fba61b4a247d645
                                                                                        • Opcode Fuzzy Hash: edefa25e46c0851931953bc47b51b44f59ff3e2eca058ac218ee4e6c5736bcfd
                                                                                        • Instruction Fuzzy Hash: 35E08611B1814682DB58A7A7ED0656AE151EF48FC0B889136EE0D07755DD2DD4904E08
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memmove.VCRUNTIME140(?,?,?,?,00000000,?,00000000,?,?,00007FFB23A3ACBB), ref: 00007FFB23A3F38D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3848653567.00007FFB23A31000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFB23A30000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3848394200.00007FFB23A30000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848963595.00007FFB23A43000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849022884.00007FFB23A4B000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A4F000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A52000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb23a30000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memmove
                                                                                        • String ID:
                                                                                        • API String ID: 2162964266-0
                                                                                        • Opcode ID: f733b39cd9b3d6a48b9bb9502177f3f0aec5dd02c896fcad4a012aba928f8d11
                                                                                        • Instruction ID: 584d2362dc214aef3169f43c47ed5b7e5e46fa1cc78a104bf3b0e953a2a70e8a
                                                                                        • Opcode Fuzzy Hash: f733b39cd9b3d6a48b9bb9502177f3f0aec5dd02c896fcad4a012aba928f8d11
                                                                                        • Instruction Fuzzy Hash: 6B315972A24BC589DB51DF35E8404AD7365FB46BE8B484232EA7D23BD4DF38E0928341
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • VirtualAlloc.KERNEL32(?,?,?,?,0FFFFFFFFFFFFFF0,00007FFB23A3F3C3,?,?,?,?,00000000,?,00000000,?,?,00007FFB23A3ACBB), ref: 00007FFB23A40FD0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3848653567.00007FFB23A31000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFB23A30000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3848394200.00007FFB23A30000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3848963595.00007FFB23A43000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849022884.00007FFB23A4B000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A4F000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3849096473.00007FFB23A52000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb23a30000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 003aa096faa16a4b23c56958aa706e70d00b42ec2a06041f937fe56edc419e03
                                                                                        • Instruction ID: 143a854313422b766cd5df1168d3046e55a445a329a993abc5d3a7ec2e537c05
                                                                                        • Opcode Fuzzy Hash: 003aa096faa16a4b23c56958aa706e70d00b42ec2a06041f937fe56edc419e03
                                                                                        • Instruction Fuzzy Hash: FB213872908BC4CAC7A1CF31D8800AD77A4FB953A8B145631FB9E12A48CF39C591CB40
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessageSend$Window$Create$Move$ObjectSelect$#380BaseClientDialogDrawFontIndirectInfoParametersRectReleaseSystemTextUnits
                                                                                        • String ID: BUTTON$Close$EDIT$Failed to execute script '%ls' due to unhandled exception: %ls$STATIC
                                                                                        • API String ID: 2446303242-1601438679
                                                                                        • Opcode ID: 459a4d17a5d9d63fd32af7de9d21940b0e91a324c601fae87eb48516cdd5ea8c
                                                                                        • Instruction ID: 27bce5b2c29d24ecb9490351faedb4fc4fe5a452bdcb17d9b7cf554d99657dc0
                                                                                        • Opcode Fuzzy Hash: 459a4d17a5d9d63fd32af7de9d21940b0e91a324c601fae87eb48516cdd5ea8c
                                                                                        • Instruction Fuzzy Hash: 1DA15A36208B8187E7549F22E94479AF760F788B90F904126EF9D03B25CF3EE1A5CB54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalSection$Initialize$Leave$Enter
                                                                                        • String ID: Tcl_EventuallyFree called twice for %p$unable to alloc %u bytes
                                                                                        • API String ID: 2531408974-484115505
                                                                                        • Opcode ID: 92de2372352a581f90ed4ab18ec50c1b455fb2f103c1ae0fd6f84d233b66cb1d
                                                                                        • Instruction ID: c89457e0f81386022dce412deb982ecfcfbb63375cca817d900495882475f675
                                                                                        • Opcode Fuzzy Hash: 92de2372352a581f90ed4ab18ec50c1b455fb2f103c1ae0fd6f84d233b66cb1d
                                                                                        • Instruction Fuzzy Hash: E7E15CE1A19A4382EA549F35E958F792361FF58B88F558135CA4E833B2EF3CE445C708
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00007FFB0BFE2CC0: TlsAlloc.KERNEL32(?,?,?,?,00007FFB0BF20D9F), ref: 00007FFB0BFE2CCD
                                                                                          • Part of subcall function 00007FFB0BFE2CC0: TlsGetValue.KERNEL32 ref: 00007FFB0BFE2CFB
                                                                                          • Part of subcall function 00007FFB0BFE2CC0: GetLastError.KERNEL32(?,?,?,?,00007FFB0BF20D9F), ref: 00007FFB0BFE2D09
                                                                                          • Part of subcall function 00007FFB0BFE2CC0: LeaveCriticalSection.KERNEL32(?,?,?,?,00007FFB0BF20D9F), ref: 00007FFB0BFE2D9B
                                                                                          • Part of subcall function 00007FFB0BFE2CC0: GetProcessHeap.KERNEL32(?,?,?,?,00007FFB0BF20D9F), ref: 00007FFB0BFE2DAB
                                                                                          • Part of subcall function 00007FFB0BFE2CC0: HeapAlloc.KERNEL32(?,?,?,?,00007FFB0BF20D9F), ref: 00007FFB0BFE2DBC
                                                                                          • Part of subcall function 00007FFB0BFF8A00: TlsGetValue.KERNEL32 ref: 00007FFB0BFF83F3
                                                                                        • memcmp.VCRUNTIME140(?,?,00000000,00000001,00007FFB0BFF95CA), ref: 00007FFB0BFF8E66
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeapValue$CriticalErrorLastLeaveProcessSectionmemcmp
                                                                                        • String ID: ILLEGAL_ERRORCODE$ILLEGAL_LEVEL$ILLEGAL_OPTIONS$NONLIST_ERRORSTACK$ODDSIZEDLIST_ERRORSTACK$RESULT$TCL$UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s$bad %s value: expected dictionary but got "%s"$bad -errorcode value: expected a list but got "%s"$bad -errorstack value: expected a list but got "%s"$bad -level value: expected non-negative integer but got "%s"$concurrent dictionary modification and search$forbidden odd-sized list for -errorstack: "%s"
                                                                                        • API String ID: 1284066653-969876606
                                                                                        • Opcode ID: 2fcebbad1b7952b135ac38beaa55a4f9b87ca795c2778a19e6e017d7e1b74d9e
                                                                                        • Instruction ID: 375dcb58eecc6daa20115fc3b906cb646c3a079cdb6c777acaf43a899c0f6a60
                                                                                        • Opcode Fuzzy Hash: 2fcebbad1b7952b135ac38beaa55a4f9b87ca795c2778a19e6e017d7e1b74d9e
                                                                                        • Instruction Fuzzy Hash: A1125BE2B0964785EA649B36D444A7E67A5FF84BC0F08C436DA1E877A5EF3CE851C340
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • LeaveCriticalSection.KERNEL32 ref: 00007FFB0BF7AD41
                                                                                          • Part of subcall function 00007FFB0BF7B9C0: LeaveCriticalSection.KERNEL32 ref: 00007FFB0BF7BAC7
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DC1
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsGetValue.KERNEL32 ref: 00007FFB0C005DEF
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DFD
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E3B
                                                                                          • Part of subcall function 00007FFB0C005BB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E49
                                                                                        • memset.VCRUNTIME140 ref: 00007FFB0BF7AE0D
                                                                                        • memset.VCRUNTIME140 ref: 00007FFB0BF7AE3D
                                                                                        • memset.VCRUNTIME140 ref: 00007FFB0BF7AE67
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memset$AllocCriticalHeapLeaveSection$ErrorLastProcessValue
                                                                                        • String ID: *.enc$UpdateStringProc for type '%s' failed to create a valid string rep$UpdateStringProc should not be invoked for type %s$identity$iso8859-1$unable to alloc %u bytes$unicode$utf-8
                                                                                        • API String ID: 313328654-4101928241
                                                                                        • Opcode ID: a872980f1cf534d375af1aa0e692a0a8270a39dd3e542eb22f31e6ea8e05f473
                                                                                        • Instruction ID: c1730feb182379ab046ec0f1603de23c2bcd04490ba00eb0055ef5522db21c33
                                                                                        • Opcode Fuzzy Hash: a872980f1cf534d375af1aa0e692a0a8270a39dd3e542eb22f31e6ea8e05f473
                                                                                        • Instruction Fuzzy Hash: A9127BB2A09B4686EB109F31E454AAE73A5FF84B84F15C135DA8E837A5EF3CE055C704
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 1239891234-0
                                                                                        • Opcode ID: be108ae6727a529d83f8885eb47159bd80851fd8c8093c6f980a4c1e93935562
                                                                                        • Instruction ID: 88f29ececab1f22cf5b63acc4b6186ef66dca4d35bebe453871747fb12d1a56b
                                                                                        • Opcode Fuzzy Hash: be108ae6727a529d83f8885eb47159bd80851fd8c8093c6f980a4c1e93935562
                                                                                        • Instruction Fuzzy Hash: 49315F32618B8186EB60DF66EC403AEF3A4FB84754F900136EA9D43B98DF39D5558F14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                                        • String ID:
                                                                                        • API String ID: 2227656907-0
                                                                                        • Opcode ID: 623d3f57ef72cd0df657952e6d1f3843b180603a65a1e46de5efd301fd58a1b3
                                                                                        • Instruction ID: 048d49747cd344cea66e2209bb3119911f94579cd1155c3ae6dfb7601ac587db
                                                                                        • Opcode Fuzzy Hash: 623d3f57ef72cd0df657952e6d1f3843b180603a65a1e46de5efd301fd58a1b3
                                                                                        • Instruction Fuzzy Hash: 6BB19362B1869641EB61AB239C007BEE790EF44BE4F845133EE6D07B95DE3DE441CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memmovememset
                                                                                        • String ID: ..\s\crypto\rsa\rsa_oaep.c$W
                                                                                        • API String ID: 1288253900-622388702
                                                                                        • Opcode ID: 254080681a234d0b46ad79bc742198f5fe6a08eaa9f68329b6aafb8f65e79d05
                                                                                        • Instruction ID: 3aa0b75f66051f185d369644f6ea446b57efa2c3324ebbdfa9de65c28e5656dc
                                                                                        • Opcode Fuzzy Hash: 254080681a234d0b46ad79bc742198f5fe6a08eaa9f68329b6aafb8f65e79d05
                                                                                        • Instruction Fuzzy Hash: F0C1E8A2B18AC651DB24CB38D400ABA6761FBC5B84F508635DF8EA3B65DF3DD145CB00
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc
                                                                                        • String ID: Failed to get address for PyDict_GetItemString$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyList_New$Failed to get address for PyLong_AsLong$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PySys_AddWarnOption$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetArgvEx$Failed to get address for PySys_SetObject$Failed to get address for PySys_SetPath$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_BuildValue$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_DontWriteBytecodeFlag$Failed to get address for Py_FileSystemDefaultEncoding$Failed to get address for Py_Finalize$Failed to get address for Py_FrozenFlag$Failed to get address for Py_GetPath$Failed to get address for Py_IgnoreEnvironmentFlag$Failed to get address for Py_IncRef$Failed to get address for Py_Initialize$Failed to get address for Py_NoSiteFlag$Failed to get address for Py_NoUserSiteDirectory$Failed to get address for Py_OptimizeFlag$Failed to get address for Py_SetPath$Failed to get address for Py_SetProgramName$Failed to get address for Py_SetPythonHome$Failed to get address for Py_UTF8Mode$Failed to get address for Py_UnbufferedStdioFlag$Failed to get address for Py_VerboseFlag$GetProcAddress$PyDict_GetItemString$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyList_New$PyLong_AsLong$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyRun_SimpleStringFlags$PySys_AddWarnOption$PySys_GetObject$PySys_SetArgvEx$PySys_SetObject$PySys_SetPath$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_BuildValue$Py_DecRef$Py_DecodeLocale$Py_DontWriteBytecodeFlag$Py_FileSystemDefaultEncoding$Py_Finalize$Py_FrozenFlag$Py_GetPath$Py_IgnoreEnvironmentFlag$Py_IncRef$Py_Initialize$Py_NoSiteFlag$Py_NoUserSiteDirectory$Py_OptimizeFlag$Py_SetPath$Py_SetProgramName$Py_SetPythonHome$Py_UTF8Mode$Py_UnbufferedStdioFlag$Py_VerboseFlag
                                                                                        • API String ID: 190572456-3109299426
                                                                                        • Opcode ID: 9e5338f17e9a06305e3f6e0c00f43c9f2351ab77f2791f85b3366b77a8fa4fe8
                                                                                        • Instruction ID: fe78e2559709000415b592360d5c842d86f3b96af817ae35b20097de14541810
                                                                                        • Opcode Fuzzy Hash: 9e5338f17e9a06305e3f6e0c00f43c9f2351ab77f2791f85b3366b77a8fa4fe8
                                                                                        • Instruction Fuzzy Hash: 6042C964A09F4791FB55FB0AAD40274E3A2EF14781BC45037CC1D0A368FF7EB5588A29
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeapValue$ErrorLastProcess$CriticalLeaveSection
                                                                                        • String ID: %$?interp?$LOOKUP$TCL$TlsGetValue failed from TclpGetAllocCache$VARIABLE$alloc: invalid block: %p: %x %x$could not allocate thread local storage$list creation failed: unable to alloc %u bytes$r Tcl$tcl_library$unable to alloc %u bytes
                                                                                        • API String ID: 2146852489-3403854403
                                                                                        • Opcode ID: 08c56adb315c9207cec52867a8cf4c6e5ee60d62f5f97e7730ab842b5ed1bcbb
                                                                                        • Instruction ID: dc0a243be448f765a603f4ac11cdd23339eec6f3da407794d36cdc840843f8dd
                                                                                        • Opcode Fuzzy Hash: 08c56adb315c9207cec52867a8cf4c6e5ee60d62f5f97e7730ab842b5ed1bcbb
                                                                                        • Instruction Fuzzy Hash: A6F1D0F2A0D64289EB509F35E514A7973A0EF48B84F188135DE4E877A6EF3CE481C744
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00007FFB0C011B00: memmove.VCRUNTIME140(?,?,?,?,FFFFFFFF,?,?,?,?,?,?,?,?,?,?,00007FFB0C006530), ref: 00007FFB0C011B79
                                                                                          • Part of subcall function 00007FFB0C011B00: memmove.VCRUNTIME140(?,?,?,00007FFB0C006530), ref: 00007FFB0C011BC2
                                                                                        • memmove.VCRUNTIME140 ref: 00007FFB0BF27A29
                                                                                        • memmove.VCRUNTIME140 ref: 00007FFB0BF27AC9
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DC1
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsGetValue.KERNEL32 ref: 00007FFB0C005DEF
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DFD
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E3B
                                                                                          • Part of subcall function 00007FFB0C005BB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E49
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memmove$AllocHeap$ErrorLastProcessValue
                                                                                        • String ID: ::tcl::file::$SAFE$SUBCOMMAND$TCL$___tmp$file$not allowed to invoke subcommand %s of file$problem making 'file %s' safe: %s$problem making 'file' safe: %s$tcl:file:$unable to alloc %u bytes$unable to realloc %u bytes
                                                                                        • API String ID: 68657648-2984438679
                                                                                        • Opcode ID: 9ba7685b0eff18e8480d8adc8d306c0bc5d343f8239e085e2c07c9375958fb3f
                                                                                        • Instruction ID: c15b0ad8235b10dccb0252ef681ca9ac99e846521b0003fe83e4ecb7949fc353
                                                                                        • Opcode Fuzzy Hash: 9ba7685b0eff18e8480d8adc8d306c0bc5d343f8239e085e2c07c9375958fb3f
                                                                                        • Instruction Fuzzy Hash: 89B1B6E2A1878286EB10EF31D494AAA7390FF44784F405436EA5F47BA9EF7CD904C744
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                                                        • API String ID: 0-666925554
                                                                                        • Opcode ID: b6a518b62961b6ba1389ad11514c459d9ea49610c1d8250730f30f8cd9b3aca8
                                                                                        • Instruction ID: ffea216d831bdf26be4788cde73bd1435d0a3eb3594f036399b8dfc625fb5c5f
                                                                                        • Opcode Fuzzy Hash: b6a518b62961b6ba1389ad11514c459d9ea49610c1d8250730f30f8cd9b3aca8
                                                                                        • Instruction Fuzzy Hash: 6C519121B4864281EB11BB23AC446B9E390EF617D4FC44033DD1D47B99EE3EE5558F28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Heap$AllocErrorFreeLastProcessValue
                                                                                        • String ID: %s called with shared object$Tcl_SetIntObj$TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage
                                                                                        • API String ID: 3216287067-2106101720
                                                                                        • Opcode ID: 4cd8a0acf2f5a2d8fa03e7c82427464b686e2507d23a9697db0cfee9f4bd68bd
                                                                                        • Instruction ID: d082c41a9d1fe2f4ae4e8f54a656323e3b7c42821cd8b4cef4e82419bd924243
                                                                                        • Opcode Fuzzy Hash: 4cd8a0acf2f5a2d8fa03e7c82427464b686e2507d23a9697db0cfee9f4bd68bd
                                                                                        • Instruction Fuzzy Hash: 955190F1A096428AEA649F35E484A3D73A0FF54B54F148135DA6F937A4EF3CE891C704
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage$exit %d$list creation failed: unable to alloc %u bytes$tclLoad$tcl_interactive$unable to alloc %u bytes
                                                                                        • API String ID: 0-3220087045
                                                                                        • Opcode ID: 97e0187500d2340d6c5df929cba958f5659831da400a18100eb14407f13a97ab
                                                                                        • Instruction ID: fd001dec207414117101d08fe1e128ec88c7c2c2ec8c45a6b1bfed617d7dc149
                                                                                        • Opcode Fuzzy Hash: 97e0187500d2340d6c5df929cba958f5659831da400a18100eb14407f13a97ab
                                                                                        • Instruction Fuzzy Hash: 56A1CFB1B0D64299EA549F35E554A7973A1EF48BD0F188130DE1E877AAEF3CE891C700
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Heap$AllocErrorFreeLastProcessValue
                                                                                        • String ID: ========= TREE NODE %s ==========$TlsGetValue failed from TclpGetAllocCache$alloc: invalid block: %p: %x %x$could not allocate thread local storage
                                                                                        • API String ID: 3216287067-3849222114
                                                                                        • Opcode ID: 20810dff6b9d5cde6508f6b39df154f4aa6be9bb07f5dc0659cf87e66319c00e
                                                                                        • Instruction ID: 6ef60bb9a1beabdf248c154d962a926c0055c28b7e55a7bc95edef605e922491
                                                                                        • Opcode Fuzzy Hash: 20810dff6b9d5cde6508f6b39df154f4aa6be9bb07f5dc0659cf87e66319c00e
                                                                                        • Instruction Fuzzy Hash: 5A41B3B1A19A828AEB60DF35E408A7977A1FF18B94F148235CA5D877B4EF3CE445C704
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeap$CriticalErrorLastLeaveProcessSectionValue
                                                                                        • String ID: TlsGetValue failed from TclpGetAllocCache$alloc: could not allocate %d new objects$could not allocate thread local storage
                                                                                        • API String ID: 3042485339-3925149219
                                                                                        • Opcode ID: 210502908ee62da6337dc3f4dc24bd4dfeaa97d682da750d863fd0841cef239a
                                                                                        • Instruction ID: 04e35f1b695b8f41f138d1afbd2bc8832f7197a763a7d801695c72d1d92f2331
                                                                                        • Opcode Fuzzy Hash: 210502908ee62da6337dc3f4dc24bd4dfeaa97d682da750d863fd0841cef239a
                                                                                        • Instruction Fuzzy Hash: DE513AF2A08B0286EB58DF39E454A7933A5FF98B44F148235CA5E833A4EF38E555C744
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DC1
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsGetValue.KERNEL32 ref: 00007FFB0C005DEF
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DFD
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E3B
                                                                                          • Part of subcall function 00007FFB0C005BB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E49
                                                                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFB0BF23D9A
                                                                                        • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FFB0BF23DA3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeap$ErrorLastProcessValue__acrt_iob_funcfflush
                                                                                        • String ID: unable to alloc %u bytes$unable to alloc %u bytes, %s line %d
                                                                                        • API String ID: 4134382769-1299489142
                                                                                        • Opcode ID: c8dfd3f4cc11afaf181dcebcb3f5495d442be25e967d0205a05333e27ce15310
                                                                                        • Instruction ID: da01768ac94cb6ceb373b7cbee115a67d08451d9ca00cd4404a1d961cc3cb968
                                                                                        • Opcode Fuzzy Hash: c8dfd3f4cc11afaf181dcebcb3f5495d442be25e967d0205a05333e27ce15310
                                                                                        • Instruction Fuzzy Hash: 0341E8F1E0D78186FB649B35E858A3A2291EF54790F248535DA5E47794FF3CE842CB08
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00000000,00007FF7285B269E,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B7507
                                                                                        • FormatMessageW.KERNEL32 ref: 00007FF7285B7536
                                                                                        • WideCharToMultiByte.KERNEL32 ref: 00007FF7285B758C
                                                                                          • Part of subcall function 00007FF7285B2620: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF7285B7774,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B2654
                                                                                          • Part of subcall function 00007FF7285B2620: MessageBoxW.USER32 ref: 00007FF7285B2730
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                                                                        • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                                                        • API String ID: 2920928814-2573406579
                                                                                        • Opcode ID: 029f836fef8ee5472c7679535fa4ba659228b0cadb04ffc4aa2330943ac4ddf3
                                                                                        • Instruction ID: a3645a7ac348c8a08a24f5b4eda7bfad08b4bdf92095c57566744f8048a24ca4
                                                                                        • Opcode Fuzzy Hash: 029f836fef8ee5472c7679535fa4ba659228b0cadb04ffc4aa2330943ac4ddf3
                                                                                        • Instruction Fuzzy Hash: 7B217171A08A4282F721AF12EC40376E265FB58385FC40136E95D83798EF3EE555CF28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: strncmp
                                                                                        • String ID: %-8d$, path=$, retcode=$, value=$..\s\crypto\conf\conf_mod.c$OPENSSL_finish$OPENSSL_init$module=$path
                                                                                        • API String ID: 1114863663-3652895664
                                                                                        • Opcode ID: efbd252d14f0e3bb26a58f53df78588ef3d5449ff3529aaf7dfbc3a72ddccb77
                                                                                        • Instruction ID: 6dac3c2d5ff20b067923ea2974ec98491c2b3265dcb43f5f3a1b285c7330e6c7
                                                                                        • Opcode Fuzzy Hash: efbd252d14f0e3bb26a58f53df78588ef3d5449ff3529aaf7dfbc3a72ddccb77
                                                                                        • Instruction Fuzzy Hash: EFA162A5B0864696FA789B36E800AB97650FF84B94F448135DE0F8BBB5DF3CE945C700
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: f$f$p$p$f
                                                                                        • API String ID: 3215553584-1325933183
                                                                                        • Opcode ID: fa9940231bde350a5f98b79da4d3c21430d5b5273eb9d997a56d31e660f397a8
                                                                                        • Instruction ID: e9b3b79929a83ec48be715fd183a2715c7e07f6fda521901c68a566d9b23151b
                                                                                        • Opcode Fuzzy Hash: fa9940231bde350a5f98b79da4d3c21430d5b5273eb9d997a56d31e660f397a8
                                                                                        • Instruction Fuzzy Hash: CE129165A0C14386FB64BA16EC5437AE2A1EF80754FC48137E699476C4CB3EE584CF78
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                        • String ID: csm$csm$csm
                                                                                        • API String ID: 849930591-393685449
                                                                                        • Opcode ID: 532212c89bb1048218e5790bfeb27ca173c8f1a64766d63ee7945c9f393af580
                                                                                        • Instruction ID: 6103f0fefd10887622c6c1092829c237ae456a8f99fbc261f087de1ed9a5bc0c
                                                                                        • Opcode Fuzzy Hash: 532212c89bb1048218e5790bfeb27ca173c8f1a64766d63ee7945c9f393af580
                                                                                        • Instruction Fuzzy Hash: F4E19472A087818AEB60AF66DC402ADF7A0FB65798F940136EE4D57B59CF3DE440CB14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • FreeLibrary.KERNEL32(?,00000000,?,00007FF7285CE182,?,?,00000157B5468DF8,00007FF7285CA253,?,?,?,00007FF7285CA14A,?,?,?,00007FF7285C54A2), ref: 00007FF7285CDF64
                                                                                        • GetProcAddress.KERNEL32(?,00000000,?,00007FF7285CE182,?,?,00000157B5468DF8,00007FF7285CA253,?,?,?,00007FF7285CA14A,?,?,?,00007FF7285C54A2), ref: 00007FF7285CDF70
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressFreeLibraryProc
                                                                                        • String ID: api-ms-$ext-ms-
                                                                                        • API String ID: 3013587201-537541572
                                                                                        • Opcode ID: d43daa0ff16dd51341f533a9afc7daaaef1b639a0d72f502c137a615a6bfef50
                                                                                        • Instruction ID: f3538aab92d439fd5bc4d2384ec9bea6a9c9886059ac2e27c3885c5da143407b
                                                                                        • Opcode Fuzzy Hash: d43daa0ff16dd51341f533a9afc7daaaef1b639a0d72f502c137a615a6bfef50
                                                                                        • Instruction Fuzzy Hash: E941FC61B19A1281EB16EB179C00676E291FF04BA0F884137DD1D87788EF3EF8058E38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • WideCharToMultiByte.KERNEL32(?,00007FF7285B36B9), ref: 00007FF7285B7BB1
                                                                                          • Part of subcall function 00007FF7285B2620: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF7285B7774,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B2654
                                                                                          • Part of subcall function 00007FF7285B2620: MessageBoxW.USER32 ref: 00007FF7285B2730
                                                                                        • WideCharToMultiByte.KERNEL32(?,00007FF7285B36B9), ref: 00007FF7285B7C25
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                        • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                        • API String ID: 3723044601-27947307
                                                                                        • Opcode ID: aab539b93ffeac37e32982e6298ac4f9f3ab9a0e846f993d4d23bb2dfd97e0ba
                                                                                        • Instruction ID: ae743e7d201bc3ebb0751ea1fe7457691fc39d46e4a83eb9da43c919e79de083
                                                                                        • Opcode Fuzzy Hash: aab539b93ffeac37e32982e6298ac4f9f3ab9a0e846f993d4d23bb2dfd97e0ba
                                                                                        • Instruction Fuzzy Hash: A4217E61A08B4285EB11EF17EC40179F661EB94B90FD84136DA5D43798EF7EE901CB28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: f$p$p
                                                                                        • API String ID: 3215553584-1995029353
                                                                                        • Opcode ID: 325dff1c9f2a8cc2ee0691d31cb87a7dd6083bcd652a905222ad4063330fef06
                                                                                        • Instruction ID: 5464ea7387ce9ad129a7c4a3cfe762d74e0c5873f1dbf899b5495cd675dbb5aa
                                                                                        • Opcode Fuzzy Hash: 325dff1c9f2a8cc2ee0691d31cb87a7dd6083bcd652a905222ad4063330fef06
                                                                                        • Instruction Fuzzy Hash: 98129F66A0C14386FB64BA16DC547B9F691FB40B52FC84037E68A476C4DB3EE5818F38
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: isdigit
                                                                                        • String ID:
                                                                                        • API String ID: 2326231117-0
                                                                                        • Opcode ID: cb61a8057eb151ceee78eec129f3db94747daaf273f59e32915e3ee70a97acbd
                                                                                        • Instruction ID: 932b812c6efd071d842f18d5a58248ec19362668b88b18cbfc2e002b60d30767
                                                                                        • Opcode Fuzzy Hash: cb61a8057eb151ceee78eec129f3db94747daaf273f59e32915e3ee70a97acbd
                                                                                        • Instruction Fuzzy Hash: 839138D3A1C0B646FB250A3AC814BF566D2FB11F42F08C136DA9BE75E4DA2DE651D310
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeap_errno$CriticalErrorLastLeaveProcessSectionValue
                                                                                        • String ID: could not get access time for file "%s"$could not read "%s": %s$could not set access time for file "%s": %s$name ?time?
                                                                                        • API String ID: 71547527-1436397362
                                                                                        • Opcode ID: d8049ceb68248b191cc2440e598c7640c1449d51457b42bc62eb1d02799a4d10
                                                                                        • Instruction ID: c5f0b80cfe181501ddf0b03468e7df004ecc6d12d04e8d5ff87b5d1e25dc2ee7
                                                                                        • Opcode Fuzzy Hash: d8049ceb68248b191cc2440e598c7640c1449d51457b42bc62eb1d02799a4d10
                                                                                        • Instruction Fuzzy Hash: 305159E1B0DA4241FE14AB32D454ABA6391AF45BC0F488035EE1E8B7A6EF2CEC418341
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFB0BF24EA2
                                                                                        • _mktime64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FFB0BF24EB3
                                                                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFB0BF24EBC
                                                                                        • LeaveCriticalSection.KERNEL32 ref: 00007FFB0BF24ECB
                                                                                          • Part of subcall function 00007FFB0C006220: TlsAlloc.KERNEL32 ref: 00007FFB0C00622D
                                                                                          • Part of subcall function 00007FFB0C006220: TlsGetValue.KERNEL32 ref: 00007FFB0C00625B
                                                                                          • Part of subcall function 00007FFB0C006220: GetLastError.KERNEL32 ref: 00007FFB0C006269
                                                                                          • Part of subcall function 00007FFB0C006220: LeaveCriticalSection.KERNEL32 ref: 00007FFB0C0062FB
                                                                                          • Part of subcall function 00007FFB0C006220: GetProcessHeap.KERNEL32 ref: 00007FFB0C00630B
                                                                                          • Part of subcall function 00007FFB0C006220: HeapAlloc.KERNEL32 ref: 00007FFB0C00631C
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DC1
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsGetValue.KERNEL32 ref: 00007FFB0C005DEF
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DFD
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E3B
                                                                                          • Part of subcall function 00007FFB0C005BB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E49
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeap$CriticalErrorLastLeaveProcessSectionValue_errno$_mktime64
                                                                                        • String ID: present$unable to alloc %u bytes
                                                                                        • API String ID: 2062418933-3155596268
                                                                                        • Opcode ID: 991f49ad2fe67ef5a666e43b30b55ebea0631db9316224ea25332499542f77e1
                                                                                        • Instruction ID: e30cdf5686eed1a094a41a13193bf39921cb29e009b7e5526537e601a8852676
                                                                                        • Opcode Fuzzy Hash: 991f49ad2fe67ef5a666e43b30b55ebea0631db9316224ea25332499542f77e1
                                                                                        • Instruction Fuzzy Hash: 8F51F2F2A086028AE714DF38D85462977A0EB88750F448335EB5E8BBE5EF3CE550CB04
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _stricmpstrchrstrncmp
                                                                                        • String ID: ..\s\crypto\store\store_lib.c$T$file
                                                                                        • API String ID: 3017659097-909561481
                                                                                        • Opcode ID: a038ef2738dfe58515af415603cd5c3188d7bac5daa1c87f7c42a19065520232
                                                                                        • Instruction ID: 33d31c19515972a3255758f54a145cf030045399dd8c2402908c20e00a684c4f
                                                                                        • Opcode Fuzzy Hash: a038ef2738dfe58515af415603cd5c3188d7bac5daa1c87f7c42a19065520232
                                                                                        • Instruction Fuzzy Hash: 4F41A672A1D78296EA25DF21E440AA977A0FBC4F84F448134DE4E87B65EF3CE505C704
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide
                                                                                        • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                                                        • API String ID: 626452242-876015163
                                                                                        • Opcode ID: ea3b9a65e065a603a2c8d8cbaca3c32032e8bbec7681d7090dd4e770de27ce71
                                                                                        • Instruction ID: 918739a457b72e632fcaffec1c6ea082fb1c77a194343130118c172261551621
                                                                                        • Opcode Fuzzy Hash: ea3b9a65e065a603a2c8d8cbaca3c32032e8bbec7681d7090dd4e770de27ce71
                                                                                        • Instruction Fuzzy Hash: FE41A332A08B82C6E710EF16EC40279E6A5FB94790F944136DE9D47BA8DF3DD411CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                          • Part of subcall function 00007FF7285B7A60: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7285B26FB), ref: 00007FF7285B7A9A
                                                                                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF7285B67F1,?,?,00000000,?,?,00007FF7285B676D), ref: 00007FF7285B64FF
                                                                                          • Part of subcall function 00007FF7285B2770: MessageBoxW.USER32 ref: 00007FF7285B2845
                                                                                        Strings
                                                                                        • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF7285B655A
                                                                                        • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF7285B6513
                                                                                        • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF7285B64D6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                                        • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                                                        • API String ID: 1662231829-3498232454
                                                                                        • Opcode ID: 36c323d19424fe0ac76ca925b523eb1a2808b36d4a593579a88913e209ccb6ab
                                                                                        • Instruction ID: de9738b9ea8d1eac9b26b1f2034f2a407ea2c1dca48d9e593d4052d07708c124
                                                                                        • Opcode Fuzzy Hash: 36c323d19424fe0ac76ca925b523eb1a2808b36d4a593579a88913e209ccb6ab
                                                                                        • Instruction Fuzzy Hash: C4319311B1868241FB24B7279D153BAD1D1EFA87C0FC44033DA4E427DEEE2EE5048E28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7285B26FB), ref: 00007FF7285B7A9A
                                                                                          • Part of subcall function 00007FF7285B2620: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF7285B7774,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B2654
                                                                                          • Part of subcall function 00007FF7285B2620: MessageBoxW.USER32 ref: 00007FF7285B2730
                                                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7285B26FB), ref: 00007FF7285B7B20
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                        • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                                                        • API String ID: 3723044601-876015163
                                                                                        • Opcode ID: ef0c7189470ede6921ef3de76a81d580bff1fc53629992aced72f99ea96e9165
                                                                                        • Instruction ID: 77973a3f6daaaeca408d7c061b68b465745bbe9a229efaeb44cd83ffed3a9cf8
                                                                                        • Opcode Fuzzy Hash: ef0c7189470ede6921ef3de76a81d580bff1fc53629992aced72f99ea96e9165
                                                                                        • Instruction Fuzzy Hash: 0D217322B08A4281EB51EB16FC0016AE361FF947C4F984132DF5C83BA9EF2DD5418F14
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalLeaveSection$strcmp
                                                                                        • String ID: -nocomplain$Cannot trace a variable with no name$Tcl_EventuallyFree called twice for %p
                                                                                        • API String ID: 1893849149-1053864565
                                                                                        • Opcode ID: 81681d696b476b8594d462d6682ba5de38214d879630eb78aec731a901b03d62
                                                                                        • Instruction ID: 9baf57ae4d4d44d28641597228735cb4a90dd055050cfd0d8ab55137ea3dfeb6
                                                                                        • Opcode Fuzzy Hash: 81681d696b476b8594d462d6682ba5de38214d879630eb78aec731a901b03d62
                                                                                        • Instruction Fuzzy Hash: 1CD1B7F2A0C68246EA558F25D858B79A3A0FFC4B84F585032DE4D4B6A5EF3CE841C748
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: strncmp
                                                                                        • String ID: COMMAND$LOOKUP$TCL$unknown command "%s"
                                                                                        • API String ID: 1114863663-4182428261
                                                                                        • Opcode ID: 8d7e27ded6bd0ed93454261b90450d364d586fad11db79ac98ce878c944e349e
                                                                                        • Instruction ID: b2f722ca6ce46f72161fa9315dde0290c3e526fbe55a75bda946744f663e4abd
                                                                                        • Opcode Fuzzy Hash: 8d7e27ded6bd0ed93454261b90450d364d586fad11db79ac98ce878c944e349e
                                                                                        • Instruction Fuzzy Hash: E8B14CB6B15B5589EF648F21D580AAD67A4FB48BC8F488435DE4E577A9EF38E480C300
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: isspace
                                                                                        • String ID: ?options? data$invalid base64 character "%c" at position %d$option
                                                                                        • API String ID: 3785662208-3947249989
                                                                                        • Opcode ID: 6fcdda687bd9dc8782c1d59519197a8677989e776cc3d654d695f1dc473e2336
                                                                                        • Instruction ID: 3846d33ee268eb744b79128c42cac2a11152cd454a68e7ed731ea447d5ed0cb6
                                                                                        • Opcode Fuzzy Hash: 6fcdda687bd9dc8782c1d59519197a8677989e776cc3d654d695f1dc473e2336
                                                                                        • Instruction Fuzzy Hash: 55A1EFE6A0D65689E6209F35D484A7A7790FB44B80F45813ADE5FC73A1DF3DE841C308
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: isspaceisxdigit
                                                                                        • String ID: ?options? data$invalid hexadecimal digit "%c" at position %d$option
                                                                                        • API String ID: 2593999819-3938697127
                                                                                        • Opcode ID: 0fb9d72c45ac2d21308dad9777470dad48dbf3cd067ca88d1d490b98d6e62ddb
                                                                                        • Instruction ID: cdc5db7bb484fc85ff27850c9bc189c419171724decc0a23ded776055bf496d4
                                                                                        • Opcode Fuzzy Hash: 0fb9d72c45ac2d21308dad9777470dad48dbf3cd067ca88d1d490b98d6e62ddb
                                                                                        • Instruction Fuzzy Hash: 5071DFB6A0878286E7209F35E454B6AB7A5FB84B84F048539DE8EC37A5DF3CE455C700
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • isdigit.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFB0C012D9F
                                                                                        • isdigit.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FFB0C012DB7
                                                                                          • Part of subcall function 00007FFB0BFFCB70: memmove.VCRUNTIME140(00000000,00000000,00000000,00007FFB0BFFC99C,?,?,00000000,00007FFB0BF69BD6,?,?,?,?,?,00007FFB0BF6C6E3), ref: 00007FFB0BFFCC2D
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: isdigit$memmove
                                                                                        • String ID: (looks like invalid octal number)$%s called with shared object$Tcl_AppendLimitedToObj
                                                                                        • API String ID: 2546899844-2667423492
                                                                                        • Opcode ID: ce46c5c73fe1b1a1eead3a92ee87215b3518c71cce05a38e7ef739d4e324b7b7
                                                                                        • Instruction ID: 010f2370047a32bab0a437597c45ec28dbb0affa57b2a22d3ee2978b349b2ad7
                                                                                        • Opcode Fuzzy Hash: ce46c5c73fe1b1a1eead3a92ee87215b3518c71cce05a38e7ef739d4e324b7b7
                                                                                        • Instruction Fuzzy Hash: 0641D6E1A1C69641FF644B35E058779A7E1EF01B88F48A031DE5E472A6EF2CE881C704
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                                        • String ID: Unhandled exception in script
                                                                                        • API String ID: 3081866767-2699770090
                                                                                        • Opcode ID: c77eb6da1437d11355308ffd2f8c7ab1623b37de00385a783310635bce07de12
                                                                                        • Instruction ID: edb54603fcba500fd4dfad215e9505309f949ac52e7f37610761c9cf7f6fe0df
                                                                                        • Opcode Fuzzy Hash: c77eb6da1437d11355308ffd2f8c7ab1623b37de00385a783310635bce07de12
                                                                                        • Instruction Fuzzy Hash: 48314272609A8289EB24EF62EC552F9E360FF48784F840136EA4D4BB59DF3DD145CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memmove
                                                                                        • String ID: ..\s\crypto\pem\pem_lib.c$;$Enter PEM pass phrase:
                                                                                        • API String ID: 2162964266-3733131234
                                                                                        • Opcode ID: 8fe84b7b5941e432665025a114fcc150736b15ceb5b1fa18c4e66cb3bc413d90
                                                                                        • Instruction ID: ea27cb622ad9c774ea4311cfb2e2c9a3bcc412e605ec00c2adf22ce0a77e9704
                                                                                        • Opcode Fuzzy Hash: 8fe84b7b5941e432665025a114fcc150736b15ceb5b1fa18c4e66cb3bc413d90
                                                                                        • Instruction Fuzzy Hash: 45717FA2A0868286F660DF71E440BBA73A0FB94794F408135EB5F87AA5DF3CD505CB00
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FFB0C012BC6), ref: 00007FFB0C004D8A
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DC1
                                                                                          • Part of subcall function 00007FFB0C005BB0: TlsGetValue.KERNEL32 ref: 00007FFB0C005DEF
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005DFD
                                                                                          • Part of subcall function 00007FFB0C005BB0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E3B
                                                                                          • Part of subcall function 00007FFB0C005BB0: HeapAlloc.KERNEL32(?,?,?,?,?,?,?,00007FFB0C00641E), ref: 00007FFB0C005E49
                                                                                        • ldexp.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,00007FFB0C012BC6), ref: 00007FFB0C005008
                                                                                        • ldexp.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,00007FFB0C012BC6), ref: 00007FFB0C00503E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocHeapldexp$ErrorLastProcessValue_errno
                                                                                        • String ID: unable to alloc %u bytes
                                                                                        • API String ID: 568620151-2759121943
                                                                                        • Opcode ID: de99f7bc926ad9348aa843634a035d599a424d7ed0056885dde5485dd6937dea
                                                                                        • Instruction ID: 50165154ba9e654320e74374fb3e62ed2b7299abe714cf028f8a4ad3c47efb84
                                                                                        • Opcode Fuzzy Hash: de99f7bc926ad9348aa843634a035d599a424d7ed0056885dde5485dd6937dea
                                                                                        • Instruction Fuzzy Hash: 6BA18DF2E046628AF7518FB4D464ABD37A1BF84748F658135DA0A63799EF38E841C708
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _invalid_parameter_noinfo
                                                                                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                        • API String ID: 3215553584-1196891531
                                                                                        • Opcode ID: 04f77fab494744c2c515884d2b3c345e4279dac145e4d051e3529eeeffec7512
                                                                                        • Instruction ID: 10619db1d3d78631994db03ff4f9531d27df9816f30f7357fe6889a507b80df7
                                                                                        • Opcode Fuzzy Hash: 04f77fab494744c2c515884d2b3c345e4279dac145e4d051e3529eeeffec7512
                                                                                        • Instruction Fuzzy Hash: 9F81C676E0C24396FB646E279D50278F790EB11B44FD54033CA0997A85CBAFE9018F79
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallEncodePointerTranslator
                                                                                        • String ID: MOC$RCC
                                                                                        • API String ID: 3544855599-2084237596
                                                                                        • Opcode ID: 07a38d77025e1089ea1fead6d05a91cb43271034c61875b0f20f744d27a01972
                                                                                        • Instruction ID: c33b345980100004c16e78e56a0e683505d7aed1efdc020d1bf22bddf6fe83c4
                                                                                        • Opcode Fuzzy Hash: 07a38d77025e1089ea1fead6d05a91cb43271034c61875b0f20f744d27a01972
                                                                                        • Instruction Fuzzy Hash: C3617F36A08B458AEB109F66D8403ADF7A0FB54B88F584236EF4D17B98CF39E445CB54
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                        • String ID: csm$csm
                                                                                        • API String ID: 3896166516-3733052814
                                                                                        • Opcode ID: 15a90b008ee0b5328ce42465ae6c6f27eb603fbbd906650bc51354757df09ebd
                                                                                        • Instruction ID: a80411d2c2f0ce8c47cc4f9eb3174d2a96e9e580382f477d72d1b97bc50b30f6
                                                                                        • Opcode Fuzzy Hash: 15a90b008ee0b5328ce42465ae6c6f27eb603fbbd906650bc51354757df09ebd
                                                                                        • Instruction Fuzzy Hash: 7B51A17290868286EB70AF129D44368F7A0FB64B95F984136DA4C47BD9DF3DF4508F18
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Value_isnan
                                                                                        • String ID: number$unable to alloc %u bytes
                                                                                        • API String ID: 3323270972-3206380325
                                                                                        • Opcode ID: 3084097199fdb71fd7932d27f3eb121673cb23accee58df23edc315234e1a60c
                                                                                        • Instruction ID: be2983c62a3f8200f168bdf9623fed98f14e37e6c5a811a9b8af7264f16c4ef8
                                                                                        • Opcode Fuzzy Hash: 3084097199fdb71fd7932d27f3eb121673cb23accee58df23edc315234e1a60c
                                                                                        • Instruction Fuzzy Hash: 0451A1F2A08B4286EB60CF25E444A7973A4FF54B94F558631DA6E877A4EF3CE490C700
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: Message$ByteCharMultiWide
                                                                                        • String ID: %s%s: %s$Fatal error detected
                                                                                        • API String ID: 1878133881-2410924014
                                                                                        • Opcode ID: 4ccfa1ca3bcae5acffff1ea197f60ccb63abed4ad3799bdff7ceda7eadf1df34
                                                                                        • Instruction ID: f5a8db318d986dd3df7347f18e44d709208b147db0aa8298ebc18610f518314d
                                                                                        • Opcode Fuzzy Hash: 4ccfa1ca3bcae5acffff1ea197f60ccb63abed4ad3799bdff7ceda7eadf1df34
                                                                                        • Instruction Fuzzy Hash: 4C317272628A8191EB20E711EC516EAE364FF94784FC04037EA8D46A99DF3DD345CF68
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: __acrt_iob_funcfflush
                                                                                        • String ID: unable to realloc %u bytes$unable to realloc %u bytes, %s line %d
                                                                                        • API String ID: 1524832935-2415941218
                                                                                        • Opcode ID: 583a0ba0b3f7bd47ddac9be38854f7eec1b1acd6996bdc2686af5d009e8a3629
                                                                                        • Instruction ID: 0de4b994d996c1b1fc1994e3935e53c8f14459af0b814b2a7afc663ad2a3ad42
                                                                                        • Opcode Fuzzy Hash: 583a0ba0b3f7bd47ddac9be38854f7eec1b1acd6996bdc2686af5d009e8a3629
                                                                                        • Instruction Fuzzy Hash: 1C01F1D0F0874246FB646B71E08897A22509FA8780F148834DE0F43B96FF3CE8558204
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetModuleFileNameW.KERNEL32(?,00007FF7285B36B9), ref: 00007FF7285B3BF1
                                                                                          • Part of subcall function 00007FF7285B2620: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF7285B7774,?,?,?,?,?,?,?,?,?,?,?,00007FF7285B101D), ref: 00007FF7285B2654
                                                                                          • Part of subcall function 00007FF7285B2620: MessageBoxW.USER32 ref: 00007FF7285B2730
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastMessageModuleName
                                                                                        • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                                                        • API String ID: 2581892565-1977442011
                                                                                        • Opcode ID: 1e1fb772b1588bb2ef8aa65086850d6655ce62306cfd8bfdc61953077b8dd8c7
                                                                                        • Instruction ID: 0ba5a008f4c12d3b44306c2e28d969a939dde721f5f2e5a95cdc3342a031ba7b
                                                                                        • Opcode Fuzzy Hash: 1e1fb772b1588bb2ef8aa65086850d6655ce62306cfd8bfdc61953077b8dd8c7
                                                                                        • Instruction Fuzzy Hash: 98018820B1968250FB21B712DC053FAD291EF68384FC40433E84D8639AEE6EE555CF28
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memcmp
                                                                                        • String ID:
                                                                                        • API String ID: 1475443563-0
                                                                                        • Opcode ID: 6eede35ed34df6884cfaebe39a9868ddde1e4d6f7a31935b052b1a33c3694b1b
                                                                                        • Instruction ID: 6e309130913d84c2c84d202753be84c80118759a2ed48f29b4aa4afd71e6695f
                                                                                        • Opcode Fuzzy Hash: 6eede35ed34df6884cfaebe39a9868ddde1e4d6f7a31935b052b1a33c3694b1b
                                                                                        • Instruction Fuzzy Hash: CC81C6A1B08A5769EB349A36D550DB927A1BF847C4F40D435DE4ECBEA9EF28E445C300
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                        • String ID:
                                                                                        • API String ID: 2718003287-0
                                                                                        • Opcode ID: 87663b63aee2c8a84d417a22dd3cc71da84cd46cd72d182d0421c23b89921904
                                                                                        • Instruction ID: 37ff0296e8ccda0ce497a2feddf1b47b298b712a68b9ea1746532bf21fe2e36f
                                                                                        • Opcode Fuzzy Hash: 87663b63aee2c8a84d417a22dd3cc71da84cd46cd72d182d0421c23b89921904
                                                                                        • Instruction Fuzzy Hash: A9D10532B18A8589E711DF76DC402ACB7B1FB44B98B804136CF5E57B99DE3AD016CB24
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • memmove.VCRUNTIME140(?,?,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00007FFB0BFA4C67), ref: 00007FFB0BFA1DC1
                                                                                        • memmove.VCRUNTIME140(?,?,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00007FFB0BFA4C67), ref: 00007FFB0BFA1E5E
                                                                                        • memmove.VCRUNTIME140(?,?,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00007FFB0BFA4C67), ref: 00007FFB0BFA1ED6
                                                                                          • Part of subcall function 00007FFB0BFFBBF0: memmove.VCRUNTIME140(?,?,?,00007FFB0C013401), ref: 00007FFB0BFFBC65
                                                                                          • Part of subcall function 00007FFB0BFE3420: TlsGetValue.KERNEL32 ref: 00007FFB0BFE347D
                                                                                          • Part of subcall function 00007FFB0BFE3420: TlsGetValue.KERNEL32 ref: 00007FFB0BFE3559
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memmove$Value
                                                                                        • String ID: unable to alloc %u bytes
                                                                                        • API String ID: 4290888040-2759121943
                                                                                        • Opcode ID: d95698a72362bead776d15dc89cb754a1a18a64f6855835a1fadecef86ae2226
                                                                                        • Instruction ID: 4afc93b16455f590b31f046bb43b8914f51643c911f57b7118d8f88816c54ef8
                                                                                        • Opcode Fuzzy Hash: d95698a72362bead776d15dc89cb754a1a18a64f6855835a1fadecef86ae2226
                                                                                        • Instruction Fuzzy Hash: CBA1D0F2A087828AE6249F26E48497AB7A5FB85BC4F158135DE4F87765DF3CE501C700
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: )$..\s\crypto\evp\p5_crpt.c
                                                                                        • API String ID: 0-3563398421
                                                                                        • Opcode ID: b935aa7f4b79a91aef52fcef466cdce5ad720e332aed8398555c8c4331f7a9a1
                                                                                        • Instruction ID: fd614fbe1939f4c52f8a3551956e1da9333550780fd2c70fbf85648ab081af89
                                                                                        • Opcode Fuzzy Hash: b935aa7f4b79a91aef52fcef466cdce5ad720e332aed8398555c8c4331f7a9a1
                                                                                        • Instruction Fuzzy Hash: D29174A6A1864386FA64DB36D411ABA6390FF857C0F548031E94FC7AA6DF7CE945CB00
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF7285CC44B), ref: 00007FF7285CC57C
                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF7285CC44B), ref: 00007FF7285CC607
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConsoleErrorLastMode
                                                                                        • String ID:
                                                                                        • API String ID: 953036326-0
                                                                                        • Opcode ID: e65a1ef3f10fff74d3232b46e78c6d325de19383b218cad3662b4f5595b6db4d
                                                                                        • Instruction ID: 041e5dba09714e549d01c12a47160c943994dc3f8911bc248598d1436955ccfa
                                                                                        • Opcode Fuzzy Hash: e65a1ef3f10fff74d3232b46e78c6d325de19383b218cad3662b4f5595b6db4d
                                                                                        • Instruction Fuzzy Hash: 4391B722E1865145F750EF6A8C4027DEBA0EB04788FD4513BDE4E57A94CF3AD8858F34
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3837759496.00007FFB0BF01000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FFB0BF00000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3837455166.00007FFB0BF00000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838176023.00007FFB0C048000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838304419.00007FFB0C08F000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3838379398.00007FFB0C092000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0bf00000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 74d434e4fdca47f7a14051a4bee67122480a388d26670ed72e2621232cab1916
                                                                                        • Instruction ID: 09b18d24001698e7a689b0171fae6463eff1f48a35c511ac1a2fa5c13d6021ab
                                                                                        • Opcode Fuzzy Hash: 74d434e4fdca47f7a14051a4bee67122480a388d26670ed72e2621232cab1916
                                                                                        • Instruction Fuzzy Hash: 0C716DF2E0C1A349F7648E74C8687B93B91AF01354F264136EA5E536C5EB3DE506D304
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: strncmp
                                                                                        • String ID: content-type
                                                                                        • API String ID: 1114863663-3266185539
                                                                                        • Opcode ID: 4f627bc4d6fc4b1438e155e9d31860f485b5e4afe1aa8a8979eb794062267d65
                                                                                        • Instruction ID: a33f2852273f35113abf310230bb665f97ecd7a085493afb4432114e9837ef90
                                                                                        • Opcode Fuzzy Hash: 4f627bc4d6fc4b1438e155e9d31860f485b5e4afe1aa8a8979eb794062267d65
                                                                                        • Instruction Fuzzy Hash: 8A51CFA2B1864345FF6496B5D550BBA62D0AF84BA8F04D230DE6FC36E5DF3CE5018304
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: strchr
                                                                                        • String ID: +-.$..\s\crypto\store\store_register.c$scheme=
                                                                                        • API String ID: 2830005266-2643984209
                                                                                        • Opcode ID: 290ce348b8c005273af76038c9fa692db73839aeff3d920a2efd2c626a0908cd
                                                                                        • Instruction ID: 1dd27aa3b03333e8a31cd6d92d1e719e1f680a41b136730c1e1991c93ba6f197
                                                                                        • Opcode Fuzzy Hash: 290ce348b8c005273af76038c9fa692db73839aeff3d920a2efd2c626a0908cd
                                                                                        • Instruction Fuzzy Hash: E95190A2B0C69362FB28DB31E450A7867A0FF84B44F848135DA4FC7AB5DF2CE9558704
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: strcmp
                                                                                        • String ID: ..\s\crypto\pem\pem_pkey.c$DH PARAMETERS$X9.42 DH PARAMETERS
                                                                                        • API String ID: 1004003707-3633731555
                                                                                        • Opcode ID: 839ae0263380899899197dd2457bd8dbfe3de3b111a238dbcc90d4e2215c9260
                                                                                        • Instruction ID: 460c761b1fcdd64cc9cc4aef64418b01c8728d074b059afcb85f307809924b02
                                                                                        • Opcode Fuzzy Hash: 839ae0263380899899197dd2457bd8dbfe3de3b111a238dbcc90d4e2215c9260
                                                                                        • Instruction Fuzzy Hash: 342198A1A08747D2EA24DB75E4009A9B7A0FFD4780F408036EA8EC7B69EF7CD555CB00
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: memmovememset
                                                                                        • String ID: $$..\s\crypto\rsa\rsa_none.c
                                                                                        • API String ID: 1288253900-779172340
                                                                                        • Opcode ID: fff434aa3adaa680fae11fcc69398c2d27884fa0413e783327ef66dbb4cd5250
                                                                                        • Instruction ID: d4cd9a7ac854d76520b89974af06f5b47492f74b124411fd8ccf227d83a41a7c
                                                                                        • Opcode Fuzzy Hash: fff434aa3adaa680fae11fcc69398c2d27884fa0413e783327ef66dbb4cd5250
                                                                                        • Instruction Fuzzy Hash: C401F162B1868292D620DF36E9444A9A761EB85BD4F14C530FB4D93FBACF3CE6018700
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                        • String ID:
                                                                                        • API String ID: 2933794660-0
                                                                                        • Opcode ID: 6f2ab88599309ed85d1430460dcf5b5c4b0e5279fe268d41b3c0937ed12eb80b
                                                                                        • Instruction ID: 0320afeb1dd8a7b7ad10ac6d4ff225990e0bf0da51335828176adb38d0c3ac2e
                                                                                        • Opcode Fuzzy Hash: 6f2ab88599309ed85d1430460dcf5b5c4b0e5279fe268d41b3c0937ed12eb80b
                                                                                        • Instruction Fuzzy Hash: 36117322B14F0289EB00DF61EC442B9B3A4F718758F841D32EE6D46764DF79D1A48794
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                        • String ID: ?
                                                                                        • API String ID: 1286766494-1684325040
                                                                                        • Opcode ID: cc93c93707fe6ffd8757fee118ce2ad6c61cc969ee8b224103013be75bcd0c07
                                                                                        • Instruction ID: ce45e0a0195cbe8c654c48c26c9165285b2cad44e52bae68ebba818da0aa98d8
                                                                                        • Opcode Fuzzy Hash: cc93c93707fe6ffd8757fee118ce2ad6c61cc969ee8b224103013be75bcd0c07
                                                                                        • Instruction Fuzzy Hash: 81410C12A0828256FB68BB179C01379D690EF907A4F948236EE6C07BD5DF3ED481CF15
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastWrite
                                                                                        • String ID: U
                                                                                        • API String ID: 442123175-4171548499
                                                                                        • Opcode ID: 9641b601b92cf1c294df7ef4fdae47acd46cee34d30520abb55b7c3ed1eb45b0
                                                                                        • Instruction ID: b462d49c938f52893d6bcd85e11a5b6ec9382c7d45ff4ededb499e1b46d20e02
                                                                                        • Opcode Fuzzy Hash: 9641b601b92cf1c294df7ef4fdae47acd46cee34d30520abb55b7c3ed1eb45b0
                                                                                        • Instruction Fuzzy Hash: 5541B622618A4185EB20DF66EC443A9F761FB94794F804032EE8D87798DF3DD441CF64
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3831499780.00007FF7285B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF7285B0000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3831217093.00007FF7285B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831645597.00007FF7285DA000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285ED000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285F0000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3831859079.00007FF7285FC000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF7285FE000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728614000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72863E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728647000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF72864B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3832106143.00007FF728655000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ff7285b0000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentDirectory
                                                                                        • String ID: :
                                                                                        • API String ID: 1611563598-336475711
                                                                                        • Opcode ID: 611271f44e087e36a2e6c0cefb1c62754a26fb09ee50a3fef66441d5d3a40745
                                                                                        • Instruction ID: 705fdf52112027ee327d37ed43c7f81e9f0435820df2cc3621723249f14a4b8a
                                                                                        • Opcode Fuzzy Hash: 611271f44e087e36a2e6c0cefb1c62754a26fb09ee50a3fef66441d5d3a40745
                                                                                        • Instruction Fuzzy Hash: BD21A5B2A0868181EB21AB16DC4527DE3B1FB84B44FC54036DA8D43684DF7EE985CF79
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000016.00000002.3833582689.00007FFB0BA41000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FFB0BA40000, based on PE: true
                                                                                        • Associated: 00000016.00000002.3833481032.00007FFB0BA40000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BA4D000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAA5000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAB9000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BACA000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BAD0000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BADD000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3833582689.00007FFB0BC85000.00000020.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BC87000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCB2000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BCE3000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD09000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3834679137.00007FFB0BD2E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835498865.00007FFB0BD55000.00000008.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835615675.00007FFB0BD56000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835657293.00007FFB0BD5B000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD5D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD79000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        • Associated: 00000016.00000002.3835734940.00007FFB0BD7D000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_22_2_7ffb0ba40000_D89C.jbxd
                                                                                        Similarity
                                                                                        • API ID: _time64
                                                                                        • String ID: !$..\s\crypto\ct\ct_policy.c
                                                                                        • API String ID: 1670930206-3401457818
                                                                                        • Opcode ID: c7f2534021006680914f08c6182638655b882cc9536bfb6ee02a751dc6b7fcac
                                                                                        • Instruction ID: e81ed41fdc30a8b83777dfc3ed9627b103c159d24342711849c01f9880f17089
                                                                                        • Opcode Fuzzy Hash: c7f2534021006680914f08c6182638655b882cc9536bfb6ee02a751dc6b7fcac
                                                                                        • Instruction Fuzzy Hash: 1CF04FA1A1660296EB589B34D415BAD6350FFD4744F548434DA0E823A1EF3CE655C704
                                                                                        Uniqueness

                                                                                        Uniqueness Score: -1.00%